YOUR HARD DRIVE IS ALMOST FULL: HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD Ismail Cem Kuru I. II. III. IV. TABLE OF CONTENTS Introduction ........................................................................................... 90 Methods of Collecting and Analyzing Information .............................. 95 A. Definitions ..................................................................................... 96 B. Data Collection Techniques........................................................... 96 1. Imaging .................................................................................... 97 a. Visible light ...................................................................... 98 b. Infrared Light .................................................................... 99 c. Radio Light ..................................................................... 100 2. Wiretapping ........................................................................... 101 3. Keyloggers............................................................................. 102 4. Radio Signals ......................................................................... 103 5. Global Positioning System (GPS) Devices............................ 105 6. Fiber Optic Tapping .............................................................. 106 7. Data Copying ......................................................................... 107 C. Data Processing Methods ............................................................ 108 Background ........................................................................................ 109 A. Text of the Fourth Amendment ................................................... 109 B. Property v. Privacy ...................................................................... 112 C. Search v. Seizure ......................................................................... 114 D. Government’s Subjective Intent .................................................. 115 E. Expectation of Privacy ................................................................ 117 1. Knowing Exposure to the Public ........................................... 119 2. Devices in General Public Use .............................................. 120 F. Wiretapping ................................................................................. 121 G. Mosaic Theory ............................................................................. 121 H. Section 215 of the USA PATRIOT Act ...................................... 124 Analysis ............................................................................................... 124 J.D. expected May 2016, University of Illinois College of Law, M.S. in Industrial Engineering, August 2013, Southern Illinois University Edwardsville. Thanks to the Honorable Cemil Kuru for being the beacon of my career. Many thanks to Andrew Leipold for teaching me the Fourth Amendment and his invaluable comments that contributed to this article. Thanks also to the editorial staff of the Illinois Journal of Law, Technology & Policy for all their hard work. 89 90 V. JOURNAL OF LAW, TECHNOLOGY & POLICY [Vol. 2016 A. Reasonable Expectation of Privacy in Life ................................. 124 B. Information Gathering is Not Seizure.......................................... 126 C. Acquisition v. Access .................................................................. 127 D. How Much is Too Much.............................................................. 128 E. Level of Suspicion ....................................................................... 129 F. Efficient Law Enforcement, Potential for Abuse......................... 131 Conclusion and Recommendation....................................................... 132 A tree falls down in a forest. If there is no one to hear it, does it make a sound? What if the tree falling down is your life being collected; your movement on public streets, your every phone call, your every visit to a website, and your every e-mail? What if that entity is the United States government? If the data is collected as a comprehensive record of United States history, saved on hard drives and it is never looked at, is that still an unreasonable search or seizure in violation of the Fourth Amendment of the United States Constitution? This article aims to answer that question. Data collection is fundamentally different than data access.1 Data collection, by itself, does not provide any information to the government.2 Therefore, it makes sense to say that only when the data is processed and put in a logical form the government learns. This article argues that there is no search within the meaning of the Fourth Amendment when the government collects data. The search occurs when the government makes sense of the data by processing it through a computer, or by an individual government official or a law enforcement officer. The article further argues that a search warrant based upon probable cause is unreasonable because the mass collected data reveals much more than can be justified by the law enforcement interest. Finally this article proposes a preponderance of the evidence standard for access to collected data. I. INTRODUCTION Humankind has generated 90% of its data in the past two years.3 This surge in data generation is, in part, a result of increase in electronic devices that seem to control our lives.4 For example, upon using the Internet to view 1. ANDREW BLANN, DATA HANDLING AND ANALYSIS 2 (2015) (“[D]ata is effectively . . . information, and we use statistics to interpret this data—to make sense of and extract meaning from it.”). 2. See Michael Pearson, How Does U.S. Data Collection Affect Me?, CNN POLITICS (June 9, 2013, 3:42 PM), http://www.cnn.com/2013/06/06/politics/nsa-verizon-records-questions/ (stating that the U.S. Government’s policy is to not access collected records “without ‘reasonable and articulable suspicion’ that they’re relevant to terrorist activity.”). 3. Matthew Wall, Big Data: Are You Ready for Blast-Off?, BBC NEWS (Mar. 4, 2014), http://www.bbc.com/news/business-26383058 (“Some say that about 90% of all the data in the world today has been created in the past few years.”); What Is Big Data?, IBM, http://www-01.ibm.com/software/ data/bigdata/what-is-big-data.html (last visited Mar. 9, 2016) (“Every day, we create 2.5 quintillion bytes of data—so much that 90% of the data in the world today has been created in the last two years alone.”). 4. See George Simos, How Much Data Is Generated Every Minute on Social Media, WERSM (Aug. 19, 2015), http://wersm.com/how-much-data-is-generated-every-minute-on-social-media/ (illustrating the enormous amount of data generated on a per-minute basis through the use of social media sites by consumers No. 1] HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD 91 this article, you have generated many data points.5 You presumably opened up a web browser; you entered a query to a search engine; identified this article as relating to your query; and viewed the article. All of those steps can be used to improve your life. The search engine might recognize your interest in the Fourth Amendment and show you relevant news, or it may show you articles with common characteristics to this one. There are many advantages to utilizing these data sets. For example, the movie-streaming service Netflix utilizes data mining6 to determine viewing habits of its subscribers.7 With that knowledge, it can predict what movies you would like to watch next, or even what kind of shows it can develop.8 Major online retailer Amazon.com uses similar techniques to suggest new items that may be interest to you based on your viewing and purchasing habits.9 The public perception of data seems to be linked to how much benefit it receives from that use. When the data is used in a way the public deems beneficial, such as the next movie to watch or what item to buy, such use is deemed acceptable.10 Therefore when data is put to use for the individual’s own benefit, the use is acceptable. Yet, website operators want to extract the entire benefit of such data by selling personally identifiable information to third parties,11 and even governments.12 Even if website operators do not sell on their electronic devices). 5. See Data, Data Everywhere, ECONOMIST (Feb. 25, 2010), http://www.economist.com/node/ 15557443 (referencing the concept of “data exhaust”—the trail of data points created by internet users that can be analyzed to derive valuable information). 6. What Is Data Mining (Predictive Analytics, Big Data), STATSOFT, http://www.statsoft.com/ Textbook/Data-Mining-Techniques (last visited Mar. 6, 2016) (“Data Mining is an analytic process designed to explore data (usually large amounts of data—typically business or market related—also known as “big data”) in search of consistent patterns and/or systematic relationships between variables, and then to validate the findings by applying the detected patterns to new subsets of data.”). 7. Roberto Baldwin, Netflix Gambles on Big Data to Become the HBO of Streaming, WIRED (Nov. 29, 2012, 6:30 AM), http://www.wired.com/2012/11/netflix-data-gamble/. 8. Id. 9. Greg Linden et al., Amazon.com Recommendations: Item-to-Item Collaborative Filtering, IEEE INTERNET COMPUTING, Jan.–Feb. 2003, at 76, https://www.cs.umd.edu/~samir/498/AmazonRecommendations.pdf; JP Mangalindan, Amazon’s Recommendation Secret, FORTUNE (July 30, 2012, 11:09 AM), http://fortune.com/2012/07/30/amazons-recommendation-secret/. 10. Letter from Daniel Castro, Dir., Ctr. for Data Innovation, to Nicole Wong, Dep. Chief Tech. Officer, Office of Sci. and Tech. Policy (Mar. 31, 2014), http://www2.datainnovation.org/2014-ostp-big-datacdi.pdf (“By helping individuals and organizations make better decisions, data has the potential to spur economic growth and improve quality of life in a broad array of fields.”); Daniel Castro & Travis Korte, Data Innovation 101: An Introduction to the Technologies and Policies Supporting Data-Driven Innovation, CTR. FOR DATA INNOVATION (Nov. 4, 2013), http://www.datainnovation.org/2013/11/data-innovation-101/ (“Individuals use data to make better decisions about everything from what they buy to how they plan for the future.”); see also Bernard Marr, How Big Data Is Changing Healthcare, FORBES (Apr. 21, 2015, 10:50 AM), http://www.forbes.com/sites/bernardmarr/2015/04/21/how-big-data-is-changing-healthcare/ (describing the benefits of data analysis in the context of the healthcare industry). 11. See Fred Guterl, How Much Control Will We Have Over Our Personal Data?, SCI. AM. (Jan. 25, 2015), http://blogs.scientificamerican.com/observations/2013/01/25/how-much-control-will-we-have-overour-personal-data/ (describing the financial incentives companies have to monetize the valuable consumer data they have been collecting over the years and the related benefits that would be provided back to consumers by use of such data). 12. Bruce Schneier, (Big) Brothers-in-Arms: The Global Public-Private Surveillance Partnership is as Strong as Ever, BLAZE (Feb. 17, 2015, 9:00 AM), http://www.theblaze.com/blog/2015/02/17/the-globalpublic-private-surveillance-partnership-is-as-strong-as-ever/ (“Many countries use corporate surveillance capabilities to monitor their own citizens.”). 92 JOURNAL OF LAW, TECHNOLOGY & POLICY [Vol. 2016 the information directly, for example Google, which is an advertising company, generates most of its revenue from targeted ads.13 A 2009 research report on user expectations on collected data suggests that there is “overwhelming concern by users about the collection of personal information and behavioral profiling.”14 The second concern of the user is the lack of control over the information collected and “for what purposes it may be used.”15 The government can (and does) utilize data to improve our daily lives. In the most basic level traffic lights can be designed and coordinated in such a way to reduce average waiting times in intersections for both motor vehicles and pedestrians.16 In the most complicated level, the National Security Agency (NSA) is collecting massive amounts of phone records without regards to any individualized suspicion for national security purposes.17 Big data analytics can revolutionize law enforcement with its ability to, “uncover hidden patterns, correlations, and other insights,” in search for criminal activity.18 Yet, we are reluctant to let government track our lives the same way as some private corporations.19 With recent news of NSA surveillance, attentions turned to limiting and controlling the government’s collection or use of our data. The Framers could not have imagined the Internet and the possible uses and abuses of that remarkable technology. Yet, they did imagine the possible abuse of government’s knowledge of our activities.20 The majority of the Supreme Court was wary of the question whether constant monitoring of a person’s location through GPS, installed by law enforcement authorities on the criminal defendant’s automobile without his knowledge, was a violation of the Fourth Amendment in United States v. Jones.21 While the court ultimately held that such monitoring was a 13. MICHAEL H. MORRIS ET AL., CORPORATE ENTREPRENEURSHIP & INNOVATION 112 (2010) (“Google primarily generates revenue by delivering relevant, cost-effective online advertising.”). 14. JOSHUA GOMEZ, TRAVIS PINNICK & ASHKAN SOLTANI, UC BERKELEY SCH. OF INFO., KNOWPRIVACY 17 (Oct. 10, 2009), http://escholarship.org/uc/item/9ss1m46b. 15. Id. 16. DDOT Blogger, Signal Optimization and Improving Traffic Flow in the District, D.ISH (Oct. 8, 2013), http://ddotdish.com/2013/10/08/signal-optimization-and-improving-traffic-flow-in-the-district/. 17. Matt Hamblen, Snowden Leaks Furor Still Spilling Over Into Courts, COMPUTERWORLD (Feb. 8, 2016, 12:02 PM), http://www.computerworld.com/article/3030661/data-privacy/ snowden-leaks-furor-stillspilling-over-into-courts-and-4th-amendment-debate.html; Dan Roberts & Spencer Ackerman, Anger Swells After NSA Phone Records Court Order Revelations, GUARDIAN (June 6, 2013, 9:05 PM), http://www.theguardian.com/world/2013/jun/06/obama-administration-nsa-verizon-records. 18. Big Data Analytics: What It Is and Why It Matters, SAS, http://www.sas.com/en_us/insights/ analytics/big-data-analytics.html (last visited Mar. 9, 2016). 19. See Doug Aamoth, PRISM Poll: Do You Care About the Government Mining Internet Data?, TIME (June 7, 2013), http://techland.time.com/2013/06/07/prism-poll-do-you-care-about-the-government-mininginternet-data/ (indicating that consumers care about the government mining Internet data); see also John H. Fleming & Elizabeth Kampf, Few Consumers Trust Companies to Keep Online Info Safe, GALLUP (June 6, 2014), http://www.gallup.com/poll/171029/few-consumers-trust-companies-keep-online-info-safe.aspx (describing the lack of trust consumers have in companies with regards to keeping collected information secure). 20. See U.S. CONST. amend. IV (stating that the U.S. government’s power to interfere with individuals’ activities is limited—i.e., by prohibiting “unreasonable searches and seizures. . . .”). 21. United States v. Jones, 132 S. Ct. 945, 948 (2012). No. 1] HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD 93 “‘search’ within the meaning of the Fourth Amendment,” they relied heavily on property-based trespass to decide the case.22 Yet, Justice Alito, joined by three other justices, stated that they would decide the case under the Katz framework, and would find long-term monitoring of a person’s location through GPS a violation of reasonable expectation of privacy.23 Justice Sotomayor was the fifth vote in deciding the case under property-based trespass doctrine, yet she wrote a concurring opinion that went a step further than Justice Alito’s opinion, stating that even short-term GPS monitoring could run afoul of the Fourth Amendment because it could reveal a lot of private information.24 If the Court eventually decides that constant GPS monitoring on public roads is a violation of the Fourth Amendment, it will open up a large avenue for litigators to argue the line that separates a violation and no violation. Although GPS tracking is convenient and cost efficient, law enforcement does not need strict GPS tracking to know where you have been.25 Our online presence creates enough data in various forms to allow an accurate picture of your life being drawn.26 One particular example is the knowledge of location information to the cellular telephone companies.27 When cell phones connect to the cell towers, the cell towers record the phone identification and the time of connection in each company’s server, which can then be used to determine a rough travel route as the cell phone travels from tower to tower.28 There are two distinct points in the data collection process where the Fourth Amendment may potentially be implicated. The first point is when the information is initially gathered by the law enforcement agency. The acquisition can occur in many ways. For example, acquisition occurs when the traffic camera captures an image,29 or when data is transmitted from a company such as Google or Facebook.30 The acquisition of data is fundamentally different than seizure of property or person.31 During the 22. 23. 24. 25. Id. at 949. Id. at 962, 964 (Alito, J., concurring). Id. at 955 (Sotomayor, J., concurring). See Kate Knibbs, In the Online Hunt for Criminals, Social Media Is the Ultimate Snitch, DIGITAL TRENDS (July 13, 2013), http://www.digitaltrends.com/social-media/the-new-inside-source-for-police-forcessocial-networks/ (describing how law enforcement officers utilize social media to locate criminal suspects); You Are Being Tracked, ACLU, https://www.aclu.org/feature/you-are-being-tracked (last visited Mar. 9, 2016) (explaining how automatic license plate readers are utilized by U.S. law enforcement entities and private companies to track criminals and “to collect information about citizens’ innocent activities just in case they do something wrong.”). 26. Knibbs, supra note 25. 27. See In re Application of the United States for Historical Cell Site Data, 724 F.3d 600, 615 (5th Cir. 2013) (allowing the collection of cell site data under the third-party doctrine); Nathaniel Wackman, Note, Historical Cellular Location Information and the Fourth Amendment, 2015 U. ILL. L. REV. 263, 267 (2015) (describing “how police and prosecutors are using historical location data from cellular telephone companies to investigate and prosecute crimes.”). 28. See Wackman, supra note 27, at 270–71 (explaining how cell service providers collect location and identification information through cell towers). 29. Red Light Camera Enforcement, CITY OF CHI., http://www.cityofchicago.org/city/en/depts/ cdot/supp_info/red-light_cameraenforcement.html (last visited Mar. 9, 2016). 30. Sam Gustin, Tech Titans Reveal New Data About NSA Snooping, TIME (Feb. 3, 2014), http://time.com/3902/tech-titans-reveal-new-data-about-nsa-snooping/. 31. See Paul Ohm, The Olmsteadian Seizure Clause: The Fourth Amendment and the Seizure of 94 JOURNAL OF LAW, TECHNOLOGY & POLICY [Vol. 2016 acquisition of information, data is either created32 or it is copied.33 As will be explained further below, the acquisition does not fit well with the traditional definition of seizure with respect to the Fourth Amendment. There are two issues to deal with when trying to analyze data collection using the traditional definition of seizure.34 In many instances, search and seizure overlap in their protection.35 Yet there is still a recognized distinction.36 A search may occur when the privacy interest is implicated, such as listening to a conversation in a phone booth;37 whereas seizure may occur when the possessory interest is implicated, such as the interest in freedom of movement.38 First of all, it is not clear whether there is any possessory interest in the data created on the Internet.39 The Supreme Court, under the false friend doctrine, has addressed the situations where a third party collects information and then turns it over to law enforcement.40 Similarly, “[d]ata in its ethereal, non-physical form is simply information.”41 The second issue is that there is no interference with the movement or freedom of the information flow.42 Similar to wiretapping, data flow continues between the source and the Intangible Property, 2008 STAN. TECH. L. REV. 40 (2008) (discussing the traditional definition of “seizure”). 32. For example, a traffic camera creates a collection of data representing the image within its field of view. Red Light Camera Enforcement, supra note 29. 33. Although in common parlance it is spoken in terms of “turning over” the information to law enforcement agencies, only a copy of information is delivered, or more likely transmitted. See Gustin, supra note 30 (illustrating how companies “turn over” information to law enforcement agencies). 34. The seizure, as discussed below, occurs, “when the [law enforcement] officer, by means of physical force or show of authority, has in some way restrained the liberty of a citizen.” Terry v. Ohio, 392 U.S. 1, 19 n.16 (1968). Similarly, a seizure of property occurs when there is, “some meaningful interference with an individual’s possessory interests in that property.” United States v. Jacobsen, 466 U.S. 109, 113 (1984). 35. J. SCOTT HARR ET AL., CONSTITUTIONAL LAW AND THE CRIMINAL JUSTICE SYSTEM 275 (6th ed., Cengage Learning 2015). For example, while prohibition against unreasonable searches protects your suitcase from being searched where it stands, prohibition against unreasonable seizures protects you by preventing the law enforcement with walking away with it. 36. Horton v. California, 496 U.S. 128, 133 (1990) (“A search compromises the individual interest in privacy; a seizure deprives the individual of dominion over his or her person or property.”); Jacobsen, 466 U.S. at 113 (“A ‘search’ occurs when an expectation of privacy that society is prepared to consider reasonable is infringed. A ‘seizure’ of property occurs when there is some meaningful interference with an individual’s possessory interests in that property.”); see also Arizona v. Hicks, 480 U.S. 321 (1987) (holding that the police officer had seized stereo equipment when he moved it to record the serial numbers); Nicholas Poehl, The Difference Between Search and Seizure, AVVO (Sept. 1, 2011), http://www.avvo.com/legal-guides/ugc/thedifference-between-search-and-seizure (describing the distinction between the terms “search” and “seizure”). 37. Horton, 496 U.S. at 133; Katz v. United States, 389 U.S. 347 (1967). 38. Jacobsen, 466 U.S. at 113. 39. Id. (“A ‘seizure’ of property occurs when there is some meaningful interference with an individual’s possessory interests in that property.”); Horton, 496 U.S. at 133 (“[A] seizure deprives the individual of dominion over his or her person or property.”). The District Court that addressed NSA’s data collection program considered both collection and use of the data as a search, and not a seizure. Klayman v. Obama, 957 F. Supp. 2d 1 (D.D.C. 2013), vacated and remanded, 800 F.3d 559 (D.C. Cir. 2015). 40. See, e.g., Smith v. Maryland, 442 U.S. 735 (1979) (involving a telephone company turning over records to law enforcement officials); United States v. Miller, 425 U.S. 435 (1976) (involving a bank turning over records to law enforcement officials). 41. Digitech Image Techs., LLC v. Elecs. for Imaging, Inc., 758 F.3d 1344, 1350 (Fed. Cir. 2014). 42. United States v. Jones, 132 S. Ct. 945, 948 (2012) (“Indeed, the success of the surveillance technique that the officers employed was dependent on the fact that the GPS did not interfere in any way with the operation of the vehicle, for if any such interference had been detected, the device might have been discovered.”). No. 1] HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD 95 destination, no one experiences any delays in phone conversations as the call is recorded or logged by phone companies.43 The second point in the data collection process where the Fourth Amendment may be implicated is when the information is accessed.44 There are many reasons to access the collected information. The most obvious is identification of individuals.45 For example, cities such as Baltimore, Chicago, and the District of Columbia have networks of video cameras surrounding areas where crime levels are higher, to identify individuals crimes.46 A more “benign” reason for accessing such collected information may be for city development. For example, traffic engineering47 relies on traffic volume in developing solutions to problems in city traffic networks.48 The purpose of this article is to devise a better way to frame the question of when a Fourth Amendment violation could occur with respect to technological surveillance, and subsequently analyze the legality of the use of data gathered by traffic cameras to monitor criminal activity. II. METHODS OF COLLECTING AND ANALYZING INFORMATION The Court never held that “potential, as opposed to actual, invasions of privacy constitute searches for purposes of the Fourth Amendment . . . . It is the exploitation of technological advances that implicates the Fourth Amendment, not their mere existence.”49 However, technological advances need to be understood before the implications of future law enforcement exploitations can be analyzed. This section will discuss devices and methods that law enforcement agencies can utilize to gather and analyze information. There are two categories that involve fundamentally different prospects for violating privacy interests of individuals. First is direct data collection. These devices and methods involve a police enforcement agency actively creating a system that gathers information.50 The second is indirect data collection. These involve data created for purposes other than law enforcement and are acquired, or that can be acquired, by the law enforcement agencies.51 43. Klayman, 957 F. Supp. 2d at 14. The details of mass data collection will be discussed further. 44. Throughout this Recent Development article, the terms “data analysis” and “data access” are used interchangeably. 45. Roberts & Ackerman, supra note 17. For example, if an agency has knowledge that a certain address is suspected of dealing contraband, the agency can also access GPS location data gathered through various sources to determine who have visited that location. 46. Andrea Noble, D.C. Surveillance Cameras Become Top Crime-Fighting Tools for Police, WASH. TIMES (June 30, 2013), http://www.washingtontimes.com/news/2013/jun/30/dc-surveillance-cameras-becometop-crime-fighting-/. 47. Traffic engineering is a branch of civil engineering that uses engineering techniques to achieve the safe and efficient movement of people and goods. ROGER P. ROESS ET AL., TRAFFIC ENGINEERING 160 (3d ed. 2004). 48. Id. 49. United States v. Karo, 468 U.S. 705, 712 (1984). 50. Statistical Language—Data Sources, AUSTL. BUREAU STAT. (last updated July 3, 2013), http://www.abs.gov.au/websitedbs/a3121120.nsf/home/statistical+language+-+data+sources. 51. Id. 96 JOURNAL OF LAW, TECHNOLOGY & POLICY A. [Vol. 2016 Definitions It is beneficial to start by defining several terms used throughout this Recent Development article. “Data point” refers to the smallest piece of information collected.52 For example, a traffic camera may record time and date, the license plate numbers of the vehicles that come in its view, speed of travel, location, or it may even take a picture.53 Each of these recordings can be referred to as a data point. For example, time is one data point, and license plate number is also a data point. License plate number, removed from the rest of the information, does not reveal anything. Each of them by themselves are nearly meaningless. “Data set” refers to a set of data points that have a meaningful relationship.54 It consists of at least two data points and a meaningful relationship between them.55 A license plate number by itself is meaningless, but when you combine a license plate number with a name and build a meaningful relationship between the two—ownership—you have something meaningful; that the individual owns a vehicle with the license plate number. For example, when the traffic camera records a license plate number, location, and traffic light condition, it would know that a vehicle with the license plate number has made a red light violation, if and only if the computer system is programmed to correlate the license plate number with the light condition.56 Take the opposite example where the system is not programmed to make such a correlation, and the camera simply records passing cars. Now, the data obtained by the camera has not yet created a meaning. The meaningful relationship is formed whenever a police officer reviews those tapes recorded by the camera and sees the red light, a vehicle passing the traffic stop line, and the license plate number. Only by building relationships between data points can we obtain meaningful information. This relationship is necessary to understand the distinguishing principle between the fundamentally different actions between the acquisition of the information and access to that information. As it will be discussed in detail further below, at the acquisition stage data consists of a collection of data points with no meaningful relationship. When the data is accessed, however, meaningful relationships occur and consequently a search occurs. B. Data Collection Techniques Direct data collection is regarded as methods and devices that are more 52. NEW OXFORD AM. DICTIONARY 430 (2d ed. 2005). 53. See Gary L. Wickert & Melissa J. Fischer, Big Brother’s Eye in the Sky: Use of Red-Light Cameras in Accident Litigation, CLAIMS J. (Aug. 7, 2014), http://www.claimsjournal.com/news/national/2014/ 08/07/252597.htm (explaining the functions and capabilities of traffic cameras). 54. NEW OXFORD AM. DICTIONARY, supra note 52. 55. Id. 56. Wickert & Fischer, supra note 53. No. 1] HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD 97 traditionally used by the law enforcement officers.57 In particular, these are the methods where the law enforcement officer is taking an action that creates data.58 Some of these devices have been around for a long time, such as wiretapping and video cameras.59 Yet, especially with regards to video cameras, recent technological improvements allow more meaningful and efficient data processing, thereby allowing more effective use of these technologies. 1. Imaging An image is a representation of what a human would see—it is the visual representation of light.60 Most of the time, what we think of an image is an image representing the visible light. However, light is not limited to what we can see.61 Infrared and radio are also forms of light.62 What distinguishes them is their wavelength and human eyes’ capability to detect them.63 The map of all the types of light that we can identify comprises the electromagnetic spectrum.64 The light classes are separated by wavelength, because the wavelength directly relates to how energetic the wave is.65 Whether a particular wavelength passes through an object depends on the energy level of the light wave and the band gap of the atoms comprising the object.66 While most solid objects reflect visible light, most allow the radio waves to pass through.67 Human ingenuity stepped up where human eyes have failed, and we have the capability to detect the entire spectrum of light.68 Different devices and techniques are used for different light. The prices of such devices vary from $50 for a point-and-shoot camera to $15,000 for a gamma ray detector as the materials required to detect certain light is much more expensive than others.69 57. See Justine Brown, Law Enforcement Agencies Face Complex Data Challenges, GOV’T TECH. (July 20, 2015), http://www.govtech.com/data/Law-Enforcement-Agencies-Face-Complex-Data-Challenges.html (describing various ways police officers collect data, such as body camera footage, fingerprints, and surveillance video footage). 58. AUSTL. BUREAU STAT., supra note 50. 59. History and Evolution of the Video Camera, LIVEWATCH, https://www.livewatch.com/history-andevolution-of-the-video-camera (last visited Mar. 9, 2016); William Lee Adams, Brief History: Wiretapping, TIME (Oct. 11, 2010), http://content.time.com/time/magazine/article/0,9171,2022653,00.html. 60. Valentin Dragoi, Chapter 14: Visual Processing: Eye and Retina, NEUROSCIENCE ONLINE (1997), http://neuroscience.uth.tmc.edu/s2/chapter14.html. 61. Molly Read, Electromagnetic Spectrum, U. WIS., http://cmb.physics.wisc.edu/pub/tutorial/ spectrum.html (last visited Mar. 9, 2016). 62. Id. 63. Id. 64. Id. 65. Id. However, the categories that separate certain wavelengths are somewhat arbitrary and may overlap. For example, x-ray (generated by electrons in the atom) and gamma ray (generated by the nucleus in the atom) categories overlap at the high-energy boundary, and they are separated by their source. 66. Wave Behaviors, NASA.GOV, http://missionscience.nasa.gov/ems/03_behaviors.html (last visited Mar. 9, 2016). 67. Id. 68. Although this may be misleading since we only named the regions of electromagnetic spectrum that we can detect. Theoretically, the shortest wavelength can be as small as a marginally longer wavelength than the smallest particle of universe. 69. See HASTINGS A. SMITH, JR. & MARCIA LUCAS, LOS ALAMOS NAT’L LAB., PASSIVE 98 JOURNAL OF LAW, TECHNOLOGY & POLICY [Vol. 2016 These technologies are commonplace. We are all familiar with movies where photographs of a suspect walking into a victim’s home are found and shown at trial. Images document what is there, precisely. Although images can be altered,70 these alterations can be detected.71 Fundamentally, what images do is provide information about a certain physical characteristic of the environment.72 It provides that a certain light is being emitted or reflected by objects.73 A camera shows the visible light, whereas a thermal imager shows the infrared light.74 Only after an image is formed or information regarding the light is obtained, do we draw conclusions. Further, each category of light gives us different information. If we detect that gamma ray radiation is radiating from a house, then we know there must be a radioactive material in the house because they do not occur naturally in the house.75 Similarly, if we detect the infrared light coming from the house, then we can infer about the use of the house.76 Unlike gamma rays, however, infrared light can tell us much more than just the existence of one particular type of material.77 a. Visible light Although the history of cameras dates back to the sixteenth century, until the invention of photography—and the discovery that some substances are altered by exposure to light—in the early nineteenth century, there was no way to preserve the images.78 What was once a costly and time-consuming endeavor is now a critical part of our culture. The number of photos uploaded and shared over the Internet has constantly risen since 2005, and in 2014, 1.8 billion photos were uploaded and shared per day.79 Cameras are most commonly used to capture visible light.80 A digital NONDESTRUCTIVE ASSAY MANUAL 63 (1991) (noting that higher resolution detectors are higher in cost in regard to gamma-ray detectors); Gamma Ray Detectors, EURSSEM, http://eurssem.eu/pages/c-4-3-gammaray-detectors (last visited Mar. 9, 2016); Point & Shoot Digital Cameras, AMAZON, http://www.amazon.com/s?rh=n%3A330405011%2Cp_36%3A1253504011 (last visited Mar. 9, 2016). 70. See President of the World, Body Evolution—Model Before and After, YOUTUBE (May 22, 2012), https://www.youtube.com/watch?v=17j5QzF3kqE&feature=youtu.be (showcasing an extreme example of how much photograph post-capture editing can affect the outcome). 71. See, e.g., Alexy Kuznetsov et al., Detecting Altered Images, BELKASOFT (Aug. 22, 2013), https://belkasoft.com/detecting-forged-images (discussing how alterations to images can be detected). 72. Chapter 2—Basic Theory—Electromagnetic Spectrum—Color is Reflected Light, LIFEPIXEL, http://www.lifepixel.com/infrared-photography-primer/ch2-basic-theory-color-is-reflected-light (last visited Mar. 9, 2016). 73. Id. 74. See Infrared Waves, NASA, http://missionscience.nasa.gov/ems/07_infraredwaves.html (last visited Mar. 9, 2016) (noting thermal imaging technology that allows humans to perceive infrared light). 75. See Gamma Rays, NASA, http://missionscience.nasa.gov/ems/12_gammarays.html (last visited Mar. 9, 2016) (explaining that gamma waves on Earth emanate from radioactive material). 76. See NASA.GOV, supra note 74 (detailing how thermal imaging can be used to detect infrared waves emanating from any number of sources, including humans). 77. See id. (explaining that many objects emit infrared waves). 78. ROBERT HIRSCH, SEIZING THE LIGHT: A HISTORY OF PHOTOGRAPHY (2000). 79. Mary Meeker, Internet Trends 2015—Code Conference, KPCB (May 27, 2015), http://www.kpcb.com/internet-trends. 80. Jerry Lodriguss, How Digital Cameras Work, CATCHING THE LIGHT (2015), No. 1] HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD 99 camera includes a digital camera sensor.81 The sensor, in turn, includes tiny light-sensitive diodes.82 The light hitting the lens is directed to the sensor.83 Light is a form of energy and each diode converts the energy in light into an electrical current.84 This electrical current is then transferred into an analog-todigital converter, which turns the signal from each diode into a digital value.85 This digital value is the value for a pixel in the image.86 The pixels are then combined to form an image.87 The major limitation in cameras is that the light must hit the lens. The camera records what it “sees.” What the camera “sees” depends on the image sensor used.88 Included in digital cameras commonly used by the public is an image sensor sensitive to visible light, which includes the wavelengths within 390 to 700 nanometers in the electromagnetic spectrum.89 b. Infrared Light Infrared light has wavelengths longer than visible spectrum, from 700 nanometers to one millimeter.90 By using diodes sensitive to infrared light wavelengths, images can be obtained with a camera.91 Usually, false color is used to differentiate between objects emitting or reflecting higher and lower intensities of infrared light.92 Thermal imagers use image sensors that are sensitive to infrared light.93 Thermal imagers are useful in dark environments because every object that stores heat naturally emanates it as infrared light. 94 The increase in the temperature of the object increases the intensity of the infrared light.95 Therefore, a difference in the temperature of adjacent objects allows the individual to distinguish between those objects, just like http://www.astropix.com/html/i_astrop/how.htm. 81. There are two different digital camera sensors currently used, CMOS and CCD. GERALD C. HOLST & TERRENCE S. LOMHEIM, CMOS/CCD SENSORS AND CAMERA SYSTEMS (2d ed., JCD Publishing 2011); see also John Wenz, These Simple Animations Show How Digital Camera Sensors Work, POPULAR MECHANICS (May 8, 2015), http://www.popularmechanics.com/technology/a15436/heres-how-the-cmos-and-ccd-sensorswork/ (showing an animation of how this technology works). 82. Lodriguss, supra note 80. 83. Id. 84. Id. 85. Id. 86. Id. 87. Id. 88. Imaging Electronics 101: Understanding Camera Sensors for Machine Vision Applications, EDMUND OPTICS, http://www.edmundoptics.com/resources/application-notes/imaging/understanding-camerasensors-for-machine-vision-applications/ (last visited Mar. 9, 2016). 89. Id. 90. What Wavelength Goes with a Color?, NASA, http://science-edu.larc.nasa.gov/EDDOCS/ Wavelengths_for_Colors.html (last visited Mar. 9, 2016); see also JOHN AVISON, THE WORLD OF PHYSICS (2d ed. 2014). 91. Do Young Kim et al., Multi-Spectral Imaging with Infrared Sensitive Organic Light Emitting Code, NATURE (Aug. 5, 2014), http://www.nature.com/articles/srep05946#close. 92. Rhett Allain, The World Looks Different Through an Infrared Camera, WIRED (Apr. 9, 2014, 6:19 PM), http://www.wired.com/2014/04/the-world-looks-different-when-you-see-in-infrared/. 93. Id. 94. Id. 95. Id. 100 JOURNAL OF LAW, TECHNOLOGY & POLICY [Vol. 2016 distinguishing between two objects emanating (or reflecting) visible light.96 Although thermal imagers are much more expensive than the visible spectrum cameras, thermal imagers can now be purchased as an add-on for digital phones such as the iPhone.97 Night vision goggles also utilize infrared light, only at a lower wavelength and nearer to the visible spectrum.98 An infrared light source positioned on the night vision goggle shines infrared light into the view of the user.99 The goggles also include sensors capable of detecting infrared light reflected from nearby objects, and using false color based on intensity, the goggles show an image to the user.100 c. Radio Light Radio waves are a form of light.101 Radio waves include the wavelengths between one millimeter and 100 kilometers in the electromagnetic spectrum.102 Radio waves can naturally be made by lightning or by astronomical objects.103 Radio waves can be used to create images.104 Further, objects in common use reflect radio waves just like any other light wave.105 Because neither people or common household objects naturally emit radio waves, it is not possible to create an image of a closed enclosure, such as a house, from the radio waves emanating from inside the enclosure similar to thermal imagers.106 However, it is possible to use a device to send radio waves with known wavelength and intensity, detect the reflected radio waves and determine whether a particular object, or person, is in the house,107 or get an accurate “image” of the inside of 96. Id. 97. See, e.g., FLIR ONE, http://www.flir.com/flirone/ (showing an example of an app-based thermal imager). 98. Infrared Waves, NASA, http://missionscience.nasa.gov/ems/07_infraredwaves.html (last visited Mar. 9, 2016). 99. Kendra Rand, Infrared Light, PHYSICS CENT., http://www.physicscentral.com/explore/action/ infraredlight.cfm (last visited Mar. 9, 2016). 100. How Night Vision Works, SOFRADIR-EC, http://sofradir-ec.com/hownightvisionworks/ (last visited Mar. 6, 2016). 101. Anatomy of an Electromagnetic Wave, NASA, http://missionscience.nasa.gov/ems/02_ anatomy.html (last visited Mar. 9, 2016). 102. CONCISE DICTIONARY OF SCI. 253 (2012). 103. Id. 104. Radar is the use of radio waves to detect objects. Emily Lakdawalla, How Radio Telescopes Get “Images” of Asteroids, PLANETARY SOC’Y (Nov. 8, 2011, 4:52 PM), http://www.planetary.org/blogs/emilylakdawalla/2011/3248.html. 105. Ian Poole, Electromagnetic Waves—Reflection, Refraction, Diffraction, RADIO-ELECTRONICS.COM, http://www.radio-electronics.com/info/propagation/em_waves/electromagnetic-reflection-refractiondiffraction.php (last visited Mar. 9, 2016). 106. Thermal Imaging: Facts vs. Fiction, P&R INFRARED, http://pr-infrared.com/about-thermal-imaging/ thermal-imaging-facts-vs-fiction/ (last visited Mar. 9, 2016). 107. As will be discussed later in this Recent Development article, the Tenth Circuit has addressed the use of such a device to determine if a suspect was inside the home before executing a search warrant. United States v. Denson, 775 F.3d 1214, 1219 (10th Cir. 2014) cert. denied, No. 14-9128, 2015 WL 1468640 (U.S. May 4, 2015); see also Brad Heath, New Police Radars Can “See” Inside Homes, USA TODAY (Jan. 20, 2015, 1:27 PM), http://www.usatoday.com/story/news/2015/01/19/police-radar-see-through-walls/22007615/ (suggesting at least fifty U.S. law enforcement agencies are utilizing radar devices to scout homes). No. 1] HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD 101 the enclosure by using several devices from different angles.108 2. Wiretapping Wiretapping technology, even if it is newer than photography, is not new.109 Wiretapping is authorized by a series of federal and state statutes.110 Wiretapping is a broad term, which encompasses many methods of intercepting communications. It receives its name because in the days of landline phones, the wires that composed the landline needed to be altered to redirect signals traveling along the wire to another location.111 Yet, it is possible to “wiretap” without physical intrusion. Communications over radios can be “tapped” using a radio frequency receiver operating at the same frequency as the radios.112 There are technical—even if not conceptual—differences in the tapping method based on the technology being used. Further, in the context of communications through the Internet, there are many points between the communication initiator and the intended recipient where a communication can be intercepted, recorded, or copied. To illustrate these concepts, take for example, an e-mail communication between Jack and Sally. Jack types the e-mail address into his browser. Whatever is typed on a computer can be recorded and transmitted to a third party using specialized software called a keylogger.113 The e-mail either travels to a wireless router using radio waves over the air or to a wired router using electrical current over an ethernet cable.114 Radio waves can be obtained using an appropriate radio receiver operating at the same frequency.115 Wires can be tapped by intercepting the electrical current during its travel.116 Next, the router sends data representing the e-mail to an Internet Service Provider (“ISP”) using fiber optic cables.117 Fiber optic cables are hollow tubes that are 108. This technique is similar to a CAT scan in a hospital, which uses hundreds of x-ray scans from different angles to create a 3D image of the tissue. Computed Tomography (CT)—Body, RADIOLOGYINFO.ORG (Sept. 23, 2014), http://www.radiologyinfo.org/en/info.cfm?pg=bodyct. 109. William Lee Adams, Brief History: Wiretapping, TIME (Oct. 11, 2010), http://content.time.com/ time/magazine/article/0,9171,2022653,00.html. 110. See ADMIN. OFFICE OF U.S. COURTS, WIRETAP REPORT 2013, TABLE 1 (2013), http://www.uscourts.gov/uscourts/Statistics/WiretapReports/2013/Table1.pdf (listing jurisdictions with statutes authorizing wiretapping activities). 111. See R. SHIREY, IETF TRUST, INTERNET SECURITY GLOSSARY 336 (2d rev., Aug. 2007), http://tools.ietf.org/html/rfc4949 (stating that “[a]lthough the term originally referred to making a mechanical connection to an electrical conductor that links two nodes, it is now used to refer to accessing information from any sort of medium used for a link or even from a node, such as a gateway or subnetwork switch.”). 112. Radio waves can be captured with any radio receiver device configured to the same frequency as the radio wave. Catch a Wave: Radio Waves and How They Work, ILLUMIN [hereinafter Catch a Wave], http://illumin.usc.edu/114/catch-a-wave-radio-waves-and-how-they-work/ (last visited Mar. 6, 2016). 113. Nikolay Grebennikov, Keyloggers: How They Work and How to Detect Them, SECURELIST (Mar. 29, 2007, 1:03 PM), https://securelist.com/analysis/publications/36138/keyloggers-how-they-work-and-howto-detect-them-part-1/. 114. How Does Wirelesss Internet Work, WIRELESS TECH. ADVISOR, http://www.wireless-technologyadvisor.com/how-does-wireless-internet-work.html (last visited Mar. 9, 2016). 115. Catch a Wave, supra note 112. 116. Fact Sheet 9: Wiretapping and Eavesdropping on Telephone Calls, PRIVACY RTS. CLEARINGHOUSE, (Feb. 2016), https://www.privacyrights.org/content/wiretapping-and-eavesdropping-telephone-calls. 117. Exploring the Modern Computer Network: Types, Functions, and Hardware, CISCO (Dec. 19, 2013), http://www.ciscopress.com/articles/article.asp?p=2158215&seqNum=6. 102 JOURNAL OF LAW, TECHNOLOGY & POLICY [Vol. 2016 covered with reflective coating, and information is carried using light.118 It is possible with a technique not unlike wiretapping to direct some of the light traveling through fiber optic cable to a third location and extract information.119 The ISP receives the e-mail in a local Point of Presence server. It then redirects the e-mail to an Internet Exchange Point (“IXP”) server.120 Each IXP server connects many ISP servers, and each IXP server is connected to one or more other IXP servers.121 Every time the e-mail reaches an ISP Point of Presence server or an IXP server, it is stored briefly in a data center.122 Whatever data is stored in the IXP can be copied to a secondary data center without affecting the journey of e-mail from Jack and Sally.123 In fact, most email servers (Google, Microsoft, Yahoo, etc.) store a copy of the e-mail on their computer.124 The e-mail then follows a similar path—ISP, router, computer—to reach Sally’s browser.125 Now that we know where the information can be copied, we can continue to discuss how this is accomplished. 3. Keyloggers Computers can be tapped by installing specialized software called a “keylogger.”126 Keyloggers record every keystroke made by the user of the computer on which it is installed.127 They can also be programmed to transmit the collected data to another computer when it is connected to a network or Internet.128 Although it is generally used for criminal purposes, or spying on 118. Information transferred using light is faster because light travels faster than electrical current and there is less resistance (therefore less loss of power) along the travel. How Fiber-Optic Internet Works, BEACON, http://fios.verizon.com/beacon/how-fiber-optic-internet-works/ (last visited Mar. 9, 2016). 119. U.S. Patent No. 6,535,671 (filed Feb. 27, 2001); see also KIMBERLIE WITCHER, FIBER OPTICS AND ITS SECURITY VULNERABILITIES 8 (Feb. 17, 2005), https://www.sans.org/reading-room/whitepapers/physical/ fiber-optics-security-vulnerabilities-1648 (stating that “[t]o do a virtually undetected tap, it is almost certain that intruders would only need available commercial items, such as, a laptop, optical tap, packet-sniffer software, and an optical/electrical converter.”). 120. What Is an Internet Exchange Point?, NETNOT https://www.netnod.se/ix/what-is-ixp (last visited Mar. 9, 2016) [hereinafter What Is an IXP?]. 121. See generally PATRICK S. RYAN & JASON GERSON, A PRIMER ON INTERNET EXCHANGE POINTS FOR POLICYMAKERS AND NON-ENGINEERS (Aug. 11, 2012), http://ssrn.com/abstract=2128103 (describing the architecture of IXP servers and systems). 122. What Is an IXP?, supra note 120. 123. See generally, INTERNET SOC’Y, THE INTERNET EXCHANGE POINT TOOLKIT & BEST PRACTICES GUIDE (Feb. 2014), https://www.internetsociety.org/sites/default/files/Global%20IXPToolkit_Collaborative% 20Draft_Feb%2024.pdf (summarizing IXP distribution protocols). 124. See, e.g., Benjamin Mako Hill, I Don’t Use Gmail, but Google Still Has Lots of My Personal Emails, SLATE (May 13, 2014, 2:03 PM), http://www.slate.com/blogs/future_tense/2014/05/13/don_t_ use_gmail_here_s_how_to_determine_how_many_of_your_emails_google_may.html (discussing Google servers storing copies of sent and received e-mails). 125. See J. KLENSIN, INTERNET SOC’Y, SIMPLE MAIL TRANSFER PROTOCOL (Apr. 2001), http:// www.ietf.org/rfc/rfc2821.txt (showing a simple e-mail transfer protocol); see also JONATHAN B. POSTEL, UNIV. S. CAL. INFO. SCI. INST., SIMPLE MAIL TRANSFER PROTOCOL (Aug. 1982), http://www.ietf.org/rfc/ rfc821.txt (showing a simple mail transfer protocol example). 126. See OXFORD ONLINE DICTIONARY, http://www.oxforddictionaries.com/definition/english/ keylogger (last visited Mar. 9, 2016) (providing the definition of “keylogger”). 127. Grebennikov, supra note 113. 128. Id. No. 1] HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD 103 friends’ and families’ Facebook accounts,129 it can also be used to gather information about suspects’ activities on the computer by gathering screenshots in addition to keystrokes. One method of delivering a keylogger to a computer is by using a Trojan horse.130 A Trojan horse is harmful software depicted as useful.131 These can be planted on websites flagged as dangerous, such as a website used in dissemination of child pornography, or a website belonging to a known criminal organization.132 A user visiting the website is asked to download a software to his computer depicting it as a helpful tool, or as the content the user is looking for.133 Once a computer user tries to open the software, nothing happens on the screen.134 The program starts recording and transmitting the information to a police officer or a third party to be analyzed.135 Smart phones are essentially a small computer, and therefore they can also be tapped using keyloggers.136 4. Radio Signals Radio signals are a form of light with wavelengths ranging from one millimeter to 100 kilometers.137 Radio signals are potentially the easiest to capture because they travel over the air and reception of the signal at one receiver does not affect the transmission of the signal to its intended destination.138 Both wireless Internet and cell phones operate over the air using radio frequency signals.139 Cell phones use radio signals to communicate with the cell towers.140 129. Security Spotlight: A Closer Look at Malicious Keyloggers, IOLO, http://www.iolo.com/resources/ articles/security-spotlight-a-closer-look-at-malicious-keyloggers/ (last visited Mar. 9, 2016). 130. Mary Landesman, What Is a Keylogger Trojan?, ABOUT TECH, http://antivirus.about.com/od/ whatisavirus/a/keylogger.htm (last visited Mar. 9, 2016). 131. Id. 132. What is a Keylogger Virus and How to Remove It, COMBOFIX (Feb. 13, 2012), http://www.combofix.org/what-is-a-keylogger-virus-and-how-to-remove-it.php; see also Trojan Virus Used to Monitor Criminals in Germany, DW NEWS (Oct. 19, 2011), http://www.dw.com/en/trojan-virus-used-tomonitor-criminals-in-germany/av-6641838 (showing a video of the German Justice Minister detailing a policy that uses Trojans to monitor convicted criminals on the Internet). 133. Pieter Arntz, What are Trojans?, MALWAREBYTES LABS (June 4, 2013), https://blog.malwarebytes.org/intelligence/2013/06/what-are-trojans/. 134. Id. 135. The courts have not yet resolved the legality of wiretapping under the Fourth Amendment. The courts that have looked at wiretapping did so in the context of the Federal Wiretap Act, 18 U.S.C. §§ 2510– 2522 (2012). See, e.g., Halperin v. Int’l Web Servs. LLC, 70 F.Supp.3d 893, 901–03 (N.D. Ill. 2014) (examining allegations of wiretapping in the context of the Federal Wiretap Act). 136. See, e.g., iKeyMonitor—Best Android Keylogger, IKEYMONITOR, http://ikeymonitor.com/androidkeylogger (describing and selling an app used to log Android phone activities) (last visited Mar. 9, 2016). 137. CONCISE DICTIONARY OF SCIENCE, supra note 102. 138. STEFAAN SEYS & BART PRENEEL, ARM: ANONYMOUS ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS (2006) (discussing why the nature of radio transmissions makes them easier to capture). As an example, consider the situation where you can turn on two television sets with the same remote at the same time. 139. Marshall Brian et al., How WiFi Works, HOWSTUFFWORKS (Apr. 30, 2001), http://computer.howstuffworks.com/wireless-network1.htmhttp://computer.howstuffworks.com/wirelessnetwork1.htm. 140. Id. 104 JOURNAL OF LAW, TECHNOLOGY & POLICY [Vol. 2016 Cell towers broadcast radio signals in frequent intervals.141 When a cell phone comes in the cell tower range, it replies to the tower with an authentication code.142 If the tower approves the authentication code, a connection is made.143 At any given time, a cell phone can be in communication with several towers simultaneously.144 The frequency of the radio signal depends on the carrier145 and is regulated by the Federal Communications Commission.146 Cell phone signals can be intercepted as they travel through the air using any receiver operating at the same frequency147 because the cell phone broadcasts the signal in every direction—it does not have the capability, nor the necessity, to broadcast the signal in a particular direction.148 The information contained in the radio signals is compressed and encrypted by the wireless communication companies.149 Yet, these encryptions are not safe.150 Therefore, it is possible to listen in to a phone conversation with relative ease. One device created specifically for this purpose is commonly called a Stingray.151 A Stingray device acts as a pirate cell tower.152 It broadcasts signals similar to that of a legitimate cell tower.153 The signal strength gradually increases.154 Because cell phones are programmed to connect to the 141. Michael Harris, How Cell Towers Work, UNISON (Mar. 9, 2011), http://www.unisonsite.com/ resource-center/resource.html?article=40 (“The primary job of a cell tower is to elevate antennas that transmit and receive radio-frequency (RF) signals from mobile phones and devices.”). 142. Cell-Phone Technology, WIKIEDUCATOR.ORG, https://wikieducator.org/images/7/7f/Cell_Phone_ technology.pdf (last visited Mar. 9, 2016). 143. Id. 144. Marguerite Reardon, Turning Cell Phones into Lifelines, CNET.COM (Dec. 8, 2006), http://www.cnet.com/news/turning-cell-phones-into-lifelines/ (illustrating that through mobile switching centers, cell phones can be connected to multiple towers). 145. Frequencies by Provider, WILSONAMPLIFIERS (Oct. 12, 2014), http://www.wilsonamplifiers.com/ frequencies-by-provider. 146. 47 C.F.R. § 2.106 (2014); Radio Spectrum Allocation, FCC, https://www.fcc.gov/encyclopedia/ radio-spectrum-allocation (last visited Mar. 9, 2016). 147. Police Use Stingray Tool to Intercept Cellphone Signals, NAT’L PUBLIC RADIO (Aug. 4, 2015), http://www.npr.org/2015/06/22/416538036/police-use-stingray-tool-to-intercept-cell-phone-signals (illustrating that certain types of equipment can intercept radio signals over the air). 148. Clay Dillow, By “Beamsteering” Antenna Signals in One Direction, Devices’ Power Consumption Could Be Halved, POPULAR SCI. (Dec. 15, 2010), http://www.popsci.com/technology/article/2010-12/steeringmobile-device-signals-one-direction-power-consumption-could-be-halved. 149. The Cell Phone Technology, U.C. SANTA BARBARA, http://www.mat.ucsb.edu/~g.legrady/ academic/courses/03w200a/projects/wireless/cell_technology.htm (last visited Mar. 9, 2016). 150. “Speaking at the Chaos Computer Club (CCC) Congress in Berlin on Tuesday, a pair of researchers demonstrated a start-to-finish means of eavesdropping on encrypted GSM cellphone calls and text messages, using only four sub-$15 telephones as network ‘sniffers,’ a laptop computer, and a variety of open source software.” Jon Borland, $15 Phone, 3 Minutes All That’s Needed to Eavesdrop on GSM Call, ARS TECHNICA (Dec. 29, 2010, 8:58 AM), http://arstechnica.com/gadgets/2010/12/15-phone-3-minutes-all-thats-needed-toeavesdrop-on-gsm-call/. 151. Joel Hruska, Stingray, the Fake Cell Phone Tower Cops and Carriers Use to Track Your Every Move, EXTREMETECH (June 17, 2014, 4:51 PM), http://www.extremetech.com/mobile/184597-stingray-thefake-cell-phone-tower-cops-and-providers-use-to-track-your-every-move. 152. Id. 153. Id. 154. The Cell Phone Technology, U.C. SANTA BARBARA, http://www.mat.ucsb.edu/~g.legrady/ academic/courses/03w200a/projects/wireless/cell_technology.htm (last visited Mar. 20, 2016); Cellular Handover and handoff, RADIO-ELECTORNICS.COM, http://www.radio-electronics.com/info/cellulartelecomms/ cellular_concepts/handover_handoff.php (last visited Mar. 20, 2016). No. 1] HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD 105 cell tower with the highest signal strength, when the signal from a Stingray reaches a critical point, nearby cell phones connect to the Stingray rather than the legitimate cell tower.155 A Stingray at this point acts as a bridge between the cell phone and the cell tower.156 It broadcasts signals to the nearby cell towers with the device identification of those devices that are connected to it.157 When a Stingray communicates with the cell tower, it conceals itself and acts as the cell phone would (with the cell phone’s identification and registration codes that it received when the cell phone tried to register with the Stingray), receives any incoming information from the cell tower and stores it before transmitting it to the cell phone.158 Similarly, any information—the device identification, phone numbers, text messages—sent from the cell phone passes through the Stingray and can be recorded at the Stingray before being transmitted to the cell tower or vice versa.159 The capabilities of a Stingray do not end there however. It can manipulate the transmissions to and from the cell tower or block them completely; instead of sending a transmission as soon as it receives it, it can store it.160 Then the user of the device can manipulate the transmission, such as the contents of a text message, and continue to transmit it to the cell tower when the modification is completed.161 5. Global Positioning System (GPS) Devices GPS is a network of satellites that are positioned around Earth, which allows for determining the position of a GPS device on Earth. Initially developed as a military project, GPS uses radio waves to triangulate162 the position of the receiver. Each GPS satellite broadcasts its position and the current time at regular intervals.163 When a GPS receiver is activated it searches for signals from GPS satellites that are broadcasted on two frequencies.164 The receiver uses this information to calculate its position on 155. Kate Martin, Documents: Tacoma Police Using Surveillance Device to Sweep Up Cellphone Data, NEWS TRIBUNE (Aug. 26, 2014, 3:56 PM), http://www.thenewstribune.com/news/local/article25878184.html. 156. Id. 157. Id. 158. Id. 159. Clarence Walker, New Hi-Tech Police Surveillance: The “StingRay” Cell Phone Spying Device, GLOBALRESEARCH (May 19, 2015), http://www.globalresearch.ca/new-hi-tech-police-surveillance-thestingray-cell-phone-spying-device/5331165 (discussing the data capturing capabilities of the StingRay device). 160. Id. 161. Hanni Fakhoury & Travor Timm, Stingrays: The Biggest Technological Threat to Cell Phone Privacy You Don’t Know About, ELEC. FRONTIER FOUND. (Oct. 22, 2012), https://www.eff.org/deeplinks/ 2012/10/stingrays-biggest-unknown-technological-threat-cell-phone-privacy. 162. TIM STOMBAUGH ET AL., UNIV. KY. COLL. OF AGRIC., GPS SIMPLIFIED (2002), http://www2.ca.uky.edu/agc/pubs/pa/pa5/PA5.PDF (discussing triangulation, a common method for determining the location of a radio receiver using three or more signals of known origin and transmission time). 163. How Does GPS Work?, PHYSICS.ORG, http://www.physics.org/article-questions.asp?id=55 (last visited Mar. 9, 2016). 164. Introduction to GPS, ESRI, http://webhelp.esri.com/arcpad/8.0/userguide/index.htm#capture_ devices/concept_intro.htm (last visited Mar. 9, 2016). 106 JOURNAL OF LAW, TECHNOLOGY & POLICY [Vol. 2016 Earth using a method called triangulation.165 The waves broadcasted by the GPS satellites are radio waves, which means that they are a form of light and travel at the speed of light.166 When the receiver receives a signal, it learns where the satellite is and when it sent the signal.167 The receiver also includes a clock.168 Therefore, the receiver knows how long it took the wave from the satellite to arrive at its location.169 A basic principle of physics is that velocity multiplied by time equals distance.170 The receiver thus knows that it is somewhere within a certain distance from a particular location—the location of the satellite when it broadcasts.171 The receiver repeats the same process twice for waves from two other satellites.172 These calculations give the receiver three intersecting spheres.173 There will be several points where all three spheres intersect.174 All but one will suggest that the receiver is far away from Earth’s surface; therefore they can be discarded.175 The remaining location is the location of the receiver.176 The GPS device does not transmit any information to the satellite in order to calculate its location; this is done internally on the device.177 The device that encompasses the GPS receiver, such as a smart phone, has other capabilities—Wi-Fi, Bluetooth, and radio transmitter to connect to the cell tower—that can broadcast its location.178 Since there is no requirement of transmitting any signal to the GPS satellite, the GPS satellite does not store any information regarding how many devices or the identification of devices in its system.179 Therefore, the only way to determine the location of a cell phone with a GPS device is if the cell phone broadcasts its location. 6. Fiber Optic Tapping As briefly articulated above, fiber optic cables can be tapped just as easily as landlines could. Fiber optic cables are coated inside with light reflective 165. STOMBAUGH, supra note 162. 166. XU GUOCHANG, GPS: THEORY, ALGORITHMS AND APPLICATIONS 87 (2d ed. 2007). 167. Id. at 3. 168. Id. at 204. 169. Id. at 3. 170. Speed and Velocity, PHYSICS CLASSROOM, http://www.physicsclassroom.com/class/1DKin/Lesson1/Speed-and-Velocity (last visited Mar. 9, 2016). 171. GUOCHANG, supra note 166. 172. Id. at 108. 173. Id. at 53. 174. Id. 175. Id. at 183 176. Id. 177. Id. at 3. 178. Guy McDowell, How Do Satellites Track Mobile Phones? [Technology Explained], MAKEUSEOF (Aug. 8, 2009), http://www.makeuseof.com/tag/technology-explained-how-do-satellites-track-mobile-phones/ (illustrating that GPS-enabled phones broadcast their signals in order to be tracked). 179. Cellular vs. Satellite: Understanding the Differences, GLOBAL DATA SYSTEMS (Feb. 24, 2015, 9:42 AM), http://www.getgds.com/blog/cellular-vs.-satellite-understanding-the-differences (explaining that cell phones use land-based towers and do not communicate with satellites directly). No. 1] HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD 107 material and commonly used to transmit internet flow.180 The light transmits data at a much higher speed and with less loss in power during transmission.181 Unlike copper wires that have resistance to the electrical current carrying data, air inside fiber optic cable applies little to no resistance to the light.182 Further, light has a certain energy level. To ensure that light reaches its destination, energy used in transmission is higher than necessary.183 A portion of the light can be redirected from its path without loss of any data transmission.184 The energy level reaching the destination will be less because some of it is redirected, but the information will be transmitted regardless.185 Most of the data flowing between ISPs are transferred using fiber optic cables.186 Fiber optic cables have higher bandwidth, so they can carry more data than copper cables, which is the type of cable used by the cable companies.187 7. Data copying The easiest way to gather data is by copying. In the common parlance, when we talk about an e-mail being “sent,” the data that shows the e-mail on your computer in fact stays in your computer until a copy of it is transmitted through the communication medium, and then it is deleted from your computer; nothing physical actually leaves the computer.188 The Internet is a network of networks. It includes many storage units connected in networks of storage units, which are connected with other networks creating a massive world wide web of storage units.189 Internet Exchange Points (“IXP”) are some of the more centralized locations where Internet traffic flows.190 Some of the more important IXPs are the ones connecting the United States to Asia and Europe.191 When IXPs receive data, the data is temporarily stored in the data 180. Physics of Total Internal Reflection, HOWSTUFFWORKS, http://computer.howstuffworks.com/fiberoptic6.htm (last visited Mar. 9, 2016). 181. Miguel Leiva-Gomez, MTE Answers: Why Is Fiber Optic Internet Faster Than Copper?, MAKETECHEASIER.COM (July 14, 2014), https://www.maketecheasier.com/why-is-fiber-optic-internet-fasterthan-copper/. 182. Id. 183. Introduction to Optical Fibers, dB, Attenuation and Measurements, CISCO, http://www.cisco.com/ c/en/us/support/docs/optical/synchronous-digital-hierarchy-sdh/29000-db-29000.html (noting that excess energy is lost until fiber reaches equilibrium) (last visited Mar. 9, 2016). 184. Vivek Alwayn, Fiber-Optic Technologies, CISCO (Apr. 23, 2004) http://www.ciscopress.com/ articles/article.asp?p=170740&seqNum=3 (noting that if “the angle of incidence is always equal to the angle of reflection, the reflected light continues to be reflected.”). 185. CORNING, GET THE FACTS ON OPTICAL FIBER! (2012), http://media.corning.com/flash/opticalfiber/ 2012/corning_optical_fiber/Documentation/FIBER_MATTERS/flipbook/585324499/files/inc/585324499.pdf (last visited Mar. 9, 2016). 186. Id. 187. Id. 188. See Dan Gookin, How E-Mail Works, FOR DUMMIES, http://www.dummies.com/how-to/content/ how-email-works.html (describing, very basically, how e-mail is transferred between recipients) (last visited Mar. 9, 2016). 189. INT’L TELECOMM. UNION, INTERNET EXCHANGE POINTS (IXPS), (Mar. 2013), https://www.itu.int/ en/wtpf-13/Documents/backgrounder-wtpf-13-ixps-en.pdf. 190. Id. 191. Dennis Weller & Bill Woodcock, Internet Traffic Exchange: Market Developments and Policy Changes, OECD DIG. ECON. PAPERS (2013), http://www.oecd-ilibrary.org/science-and-technology/ internet- 108 JOURNAL OF LAW, TECHNOLOGY & POLICY [Vol. 2016 center before being sent to another IXP.192 Because of the volume of data flowing through IXPs, this temporary storage is quickly deleted.193 Yet until it is deleted, it is susceptible to being copied.194 C. Data Processing Methods Any data gathered through a device must be processed one way or another. A microchip on the digital camera analyzes the electrical signals from the light sensor in the camera to create the image that was captured.195 The microchip in the camera can do this very simply because the data incoming from the sensor is structured.196 This means that there is an order to the information stream, and it is in a known format.197 Other forms of data collection may have similar ordered structures making it easy to discern meaning from them. The real source of information for law enforcement purposes is the Internet. As commentators198 and news media199 recognize, much of our personal information is publicly available online. In a very inspiring and concerning way, Alessandro Acquisti shares that from a picture of a random person, you can reach his social security number in two steps using publicly shared information.200 The major difficulty with the information available on the Internet is that most of the data is unstructured.201 The unstructured data is more difficult to analyze because as its name suggests, it does not have a particular order.202 Yet, big data analytics is a growing field, and it is continuing to improve the way we view data.203 Also called data mining,204 data processing methods traffic-exchange_5k918gpt130q-en. 192. GREG PANGRAZIO, SANS INSTITUTE, INTEL IXP NETWORK PROCESSOR BASED INTRUSION DETECTION (May 22, 2007), https://www.sans.org/reading-room/whitepapers/detection/intel-ixp-networkprocessor-based-intrusion-detection-32919. 193. Id. 194. Id. 195. Kyle Schurman, How Does a Digital Camera Work?, GADGET REV., http://www.gadgetreview.com/how-does-a-digital-camera-work (last visited Mar. 9, 2016). 196. See id. (explaining how digital cameras take photographs, digitize them, and create files to view later). 197. Id. 198. See, e.g., Jose Felipe Anderson, Big Brother or Little Brother? Surrendering Seizure Privacy for the Benefits of Communication Technology, 81 MISS. L.J. 895, 911 (2012) (“The average citizen has lost so much control over their personal information that it may be impossible to reverse the trend.”). 199. E.g., Jacob Morgan, Privacy Is Completely and Utterly Dead, and We Killed It, FORBES (Aug. 19, 2014, 12:04 AM), http://www.forbes.com/sites/jacobmorgan/2014/08/19/privacy-is-completely-and-utterlydead-and-we-killed-it/. 200. Alessandra Acquisti, What Will a Future Without Secrets Look Like?, TED (June 2013), http://www.ted.com/talks/alessandro_acquisti_why_privacy_matters. 201. RONEN FELDMAN & JAMES SANGER, THE TEXT MINING HANDBOOK: ADVANCED APPROACHES IN ANALYZING UNSTRUCTURED DATA (2006). 202. WILLIAM H. INMON & ANTHONY NESAVICH, TAPPING INTO UNSTRUCTURED DATA: INTEGRATING UNSTRUCTURED DATA AND TEXTUAL ANALYTICS INTO BUSINESS INTELLIGENCE (2007). 203. See Molly Galetto, Machine Learning and Big Data Analytics: The Perfect Marriage, NG DATA, http://www.ngdata.com/machine-learning-and-big-data-analytics-the-perfect-marriage/ (last updated Feb. 26, 2016) (describing the field known as “Big Data” and the challenges posed to data analytics). 204. 1 WAYNE R. LAFAVE, SEARCH & SEIZURE § 2.7(e) (5th ed. 2012). No. 1] HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD 109 uncover the secret meaning in seemingly unrelated data.205 One of the most innovative data mining techniques is the use of machine learning algorithms.206 Traditionally, a computer program would do exactly what has been programmed, and every step of the analytical rule needed to be written in the program.207 Machine learning algorithms on the other hand, generalize analytical rules from examples.208 It saves tremendous amount of time in data analysis.209 III. BACKGROUND AND ANALYSIS A. Text of the Fourth Amendment The Fourth Amendment of the United States Constitution has its roots, much like many other parts of the U.S. Constitution, in English traditions disliked by the colonies.210 Yet, the Fourth Amendment reflects the most direct attempt to protect against “writs of assistance.”211 These general warrants allowed officers of the King of England to enter any home and seize any item that they considered contraband.212 Although the courts in England considered the practice of general warrants illegal,213 the practice was continued by English authorities in the colonies to search for evidence of smuggling activities.214 The Fourth Amendment to the United States Constitution states: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.215 The first half of the Fourth Amendment bans “unreasonable searches and seizures.”216 The second half, known as the Warrant Clause, prohibits issuance of warrants without probable cause and requires particularity in its 205. Note, Data Mining, Dog Sniffs, and the Fourth Amendment, 128 HARV. L. REV. 691 (2014). 206. Galetto, supra note 203. 207. Guy M. Haas, Introduction to Computer Programming, BFOIT, http://www.bfoit.org/itp/ Programming.html (last visited Mar. 9, 2016). 208. Pedro Domingos, A Few Useful Things to Know About Machine Learning, 55 COMMS. ACM 78 (Oct. 2012), http://homes.cs.washington.edu/~pedrod/papers/cacm12.pdf. 209. See, e.g., Sneha Agarwal et al., Patci—A Tool for Identifying Scientific Articles Cited by Patents, GSLIS RESEARCH SHOWCASE (Mar. 14, 2014), https://www.ideals.illinois.edu/handle/2142/54885 (showing a successful machine learning algorithm to populate fields from unstructured textual data). 210. Thomas K. Clancy, The Framers’ Intent: John Adams, His Era, and the Fourth Amendment, 86 IND. L.J. 979 (2011). 211. Akhil Reed Amar, The Fourth Amendment, Boston, and the Writs of Assistance, 30 SUFFOLK U. L. REV. 53 (1996). 212. Id. 213. Entick v. Carrington, (1765) 95 Eng. Rep. 807 (K.B.). 214. Annotation 1—Fourth Amendment, FINDLAW, http://constitution.findlaw.com/amendment4/ annotation01.html (last visited Mar. 9, 2016). 215. U.S. CONST. amend. IV. 216. Id. 110 JOURNAL OF LAW, TECHNOLOGY & POLICY [Vol. 2016 description.217 The connection of the Warrant Clause to the Reasonableness Clause has caused much debate in academia as well as in the Supreme Court.218 The underlying principle of the Fourth Amendment is a balance of the need for efficient and effective law enforcement versus the individual’s right to be free from governmental intrusion.219 It is possible to read the two clauses separately—one as regulating the reasonableness of searches and seizures, and the other as regulating the requirements for issuing valid warrants. Therefore, it imposes increased protection against the intrusion by requiring a reasonableness requirement for the intrusion in addition to the requirements imposed on the issuance of a warrant. Although courts sometimes express a “preference” for warrants and speak of “exceptions” to the warrant requirement as both traditional220 and modern,221 current practice is that the exceptions often overwhelm the preference. The situations where “exceptions” apply are in fact situations when the interest underlying the Fourth Amendment are implicated to a lesser extent, such as a reduced expectation of privacy in automobiles,222 or not implicated at all, such as items left in plain view.223 Another justification for warrantless searches and seizures is the impracticality of obtaining a warrant in situations where there is an immediate need to preserve evidence or apprehend criminals.224 We do not expect a law enforcement officer to stop to obtain a warrant while chasing a person who has just committed a murder into his or her house. The Reasonableness Clause protects the individual’s possessory and privacy interests. “The touchstone of the Fourth Amendment is reasonableness . . . .”225 In 1968, the Supreme Court decided Terry v. Ohio.226 In a tremendous leap, the Court recognized that when there is a reduced intrusion on the liberty of the individual, warrantless searches and seizures can be effectuated upon reasonable suspicion of the law enforcement officer that a 217. Id. 218. Compare Marron v. United States, 275 U.S. 192 (1927), with Go-Bart Importing Co. v. United States, 282 U.S. 344 (1931), and United States v. Lefkowitz, 285 U.S. 452 (1932). 219. Silverman v. United States, 365 U.S. 505, 512 (1961). 220. United States v. Robinson, 414 U.S. 218, 224–35 (1973) (holding that searches of a person incident to a lawful arrest are an exception to the warrant requirement). 221. California v. Acevedo, 500 U.S. 565, 569–70 (1991) (applying an exception to automobile searches). 222. Id. 223. Washington v. Chrisman, 455 U.S. 1, 5 (1982). 224. With the technological improvements, it is now possible in many states to obtain warrants through electronic communications. See Missouri v. McNeely, 133 S. Ct. 1552, 1562 n.4 (2013) (holding that the dissipation of alcohol was not enough to waive the requirement for a warrant for a blood test in a drunk driving case); 2 WAYNE R. LAFAVE, SEARCH AND SEIZURE § 4.3(c), at 648–54, & 648 n.29 (5th ed. 2012) (describing oral search warrants and collecting state laws). 225. United States v. Knights, 534 U.S. 112, 118 (2001); see also Illinois v. McArthur, 531 U.S. 326, 330 (2001) (holding that the “central requirement” of the Fourth Amendment “is one of reasonableness” (internal quotation marks and citation omitted)); Vernonia Sch. Dist. 47J v. Acton, 515 U.S. 646, 652 (1995) (holding that “[a]s the text of the Fourth Amendment indicates, the ultimate measure of the constitutionality of a governmental search is ‘reasonableness.’”). 226. Terry v. Ohio, 392 U.S. 1 (1968). No. 1] HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD 111 crime has occurred, or is about to occur.227 In its decision to allow limited— both in duration and scope—stops and frisks, the Court placed “reasonableness” at the heart of the Fourth Amendment.228 In Terry, the Court recognized that a brief detention is justified because the level of intrusion on the individual’s interest in personal liberty is outweighed by society’s interest in the investigation of criminal activity.229 Similarly, a pat-down search for weapons is justified because the safety of a law enforcement officer outweighs the individual’s interest in privacy when the law enforcement officer has reasonable suspicion to believe the individual is armed.230 Further, due to lower intrusion on personal liberty and privacy, the court set the level of suspicion required to initiate a Terry stop at reasonable suspicion, a degree lower than probable cause.231 The Warrant Clause, on the other hand, protects the individual by requiring a neutral judicial officer to review the information available to the law enforcement officer and determine whether probable cause exists for the search or seizure.232 The Warrant Clause is a particularly good proxy of what is reasonable, and the courts have recognized it as such.233 In the situations where a warrant is not required, if there is probable cause to believe a crime has occurred or about to occur, the subsequent search or seizure is reasonable.234 The Framers believed that a warrant particularly describing the place to be searched, or the item or person to be seized, issued upon a finding of probable cause was a good balance between law enforcement interests and personal liberty.235 Although the probable cause standard is not difficult to meet, individuals’ interest in privacy of information is balanced against the needs of law enforcement.236 This loose connection between the Warrant Clause and the Reasonableness Clause could also mean that some searches or seizures conducted with a warrant could still be unreasonable.237 Especially when the amount of information gained through a search is increased further than traditionally gained through a search of a house, the probable cause standard 227. Id. 228. “For ‘what the Constitution forbids is not all searches and seizures, but unreasonable searches and seizures.’” Id. at 9 (citing Elkins v. United States, 364 U.S. 206, 222 (1960)). 229. Id. 230. Id. 231. Id 232. George R. Nock, The Point of the Fourth Amendment and the Myth of Magisterial Discretion, 23 CONN. L. REV. 1, 22 (1990). 233. See Akhil Reed Amar, Fourth Amendment First Principles, 107 HARV. L. REV. 757, 782 (1994) (noting that courts generally attached reasonableness analysis for warrantless searches and seizures); see also Almeida-Sanchez v. U.S., 413 U.S. 266, 269–72 (1973) (citing examples of courts rationalizing and citing reasonableness of searches in their cases). 234. Warden, Md. Penitentiary v. Hayden, 387 U.S. 294, 298–300 (1967). 235. See Fabio Arcila, Jr., The Death of Suspicion, 51 WM. & MARY L. REV. 1275, 1275 (2010) (noting that the Fourth Amendment was a means of limiting governmental search power). 236. See Warden, 387 U.S. at 304 (recognizing that the Fourth Amendment exists to protect one’s privacy against governmental interests). 237. Id. at 303 (“[T]here are items of evidential value whose very nature precludes them from being the object of a reasonable search and seizure.”). 112 JOURNAL OF LAW, TECHNOLOGY & POLICY [Vol. 2016 may be insufficient protection under the Reasonableness Clause of the Fourth Amendment. The Supreme Court alluded to the substantial privacy interests of data stored in cell phones in Riley v. California.238 While denying law enforcement officers’ search of cell phones incident to arrest, the Court recognized that a warrant was available for law enforcement officers to conduct the search of the cell phone.239 Yet, it also recognized that the amount of information, both quantitatively and qualitatively, distinguished the search of a cell phone from the search of a house: “[A] cell phone search would typically expose to the government far more than the most exhaustive search of a house: A phone not only contains in digital form many sensitive records previously found in the home; it also contains a broad array of private information never found in a home in any form—unless the phone is.”240 This stake in an individual’s privacy interest is further complicated in mass collection of information, which would enable the government to track the life of a person, not only by what the person himself has done on his phone, but much more extensively with what others collected about him.241 Until the recent advancements in technological information, it was not only impractical, but also impossible to collect the information from so many sources at the same time and store the information until such time the information is needed.242 As further discussed below, the privacy interest at stake may leave a warrant issued upon probable cause unreasonable. B. Property v. Privacy Fourth Amendment protections were initially constructed on top of property rights.243 The Court in Boyd v. United States244 initially recognized that foundation in its adaptation of Entick v. Carrington,245 “one of the landmark [judgments] of English liberty.”246 The Entick court stated that “every invasion of private property, be it ever so minute, is a trespass.”247 The property-based protection of the Fourth Amendment was reinforced in Olmstead v. United States.248 In Olmstead, the Court considered whether wiretapping the defendants’ phones for many months constituted a search or seizure within the meaning of the Fourth Amendment.249 The Court noted that “[s]mall wires were inserted along the ordinary telephone wires from the 238. 239. 240. 241. 242. 243. 244. 245. 246. 247. 248. 249. Riley v. California, 134 S. Ct. 2473, 2493 (2014). Id. (“Warrant is generally required before such a search.”). Id. Id. Id. at 2489. Adams v. New York, 192 U.S. 585, 598 (1904); Boyd v. United States, 116 U.S. 616, 627 (1886). Boyd, 116 U.S. at 627. Entick v Carrington, (1765) 95 Eng. Rep. 807 (K.B.). Boyd, 116 U.S. at 626. Id. at 627. Olmstead v. United States, 277 U.S. 438, 466 (1928). Id. No. 1] HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD 113 residences of four of the petitioners and those leading from the chief office” and “[t]he insertions were made without trespass upon any property of the defendants.”250 The lack of “an official search and seizure of [defendant’s] person, or such a seizure of his papers or his tangible material effects, or an actual physical invasion of his house ‘or curtilage’ for the purpose of making a seizure” condemned the defendants.251 This property approach was mostly abandoned when the Court decided Katz v. United States in 1967.252 In Katz, the issue before the Court was whether listening to a telephone conversation by attaching “an electronic listening and recording device to the outside of the public telephone booth from which [the defendant] had placed his calls” was a violation of the Fourth Amendment.253 The Court has recognized that the “Fourth Amendment protects people, not places.”254 Further, the Fourth Amendment protects “what [a person] seeks to preserve as private.”255 The rule created by the majority was captured in a two-prong test by Justice Harlan in his concurrence.256 Justice Harlan concluded that a search and seizure occurs when a person displays a subjective expectation of privacy, and when society accepts such expectation as reasonable. This test carries a first subjective and a second objective element. More recently the Court revived the trespass doctrine in United States v. Jones.257 The issue in Jones was whether GPS tracking of an individual over a long period of time was a violation of the Fourth Amendment.258 The majority of the Court avoided the bigger question, whether constant GPS monitoring of individuals over extended periods of time is reasonable.259 Justice Alito, writing for himself and three others would have instead applied the Katz test to find that constant GPS monitoring over extended periods of time is an invasion of the individual’s privacy interest.260 Justice Sotomayor, writing for herself, joined the majority in concluding that the Katz test supplements and does not replace the traditional trespass doctrine.261 Yet, she went on to apply the Katz test.262 Unlike Justice Alito, Justice Sotomayor would have found that even short-term GPS monitoring is unreasonable in the absence of a search warrant, as it tends to show the most intimate details of a person’s life, and therefore it is a violation of the individual’s privacy interest.263 250. 251. 252. 253. 254. 255. 256. 257. 258. 259. 260. 261. 262. 263. Id. at 456–57. Id. at 466. Katz v. United States, 389 U.S. 347 (1967). Id. at 348. Id. at 351. Id. Id. at 360–61 (Harlan, J., concurring). United States v. Jones, 132 S. Ct. 945, 949 (2012). Id. at 948–49. Id. at 953–54. Id. at 963–64 (Alito, J., concurring). Id. at 955 (Sotomayor, J., concurring). Id. Id. 114 JOURNAL OF LAW, TECHNOLOGY & POLICY [Vol. 2016 What is particularly interesting about the two concurring opinions is their focus on the information obtained from the GPS tracking.264 The comparison of what law enforcement agencies could accomplish through the use of many officers, vehicles, and man-hours to the capabilities of technology is a weak proxy. Traditionally, the protection from long-term surveillance was practical.265 “Traditional surveillance for any extended period of time was difficult and costly and therefore rarely undertaken. The surveillance at issue in [Jones]—constant monitoring of the location of a vehicle for four weeks— would have required a large team of agents, multiple vehicles, and perhaps aerial assistance.”266 The protection offered by the Fourth Amendment is centered on the privacy interest of the individual.267 Therefore, evaluating the privacy interest at issue in any particular case should be based on the information learned through surveillance rather than whether it could be obtained through traditional means. C. Search v. Seizure The majority in Katz did not distinguish the applicability of the test between searches and seizures.268 Yet, the plain meaning of two words distinguishes a search from a seizure. A seizure of a person occurs “when the officer, by means of physical force or show of authority, has in some way restrained the liberty of a citizen.”269 Similarly, a seizure of property occurs when there is “some meaningful interference with an individual’s possessory interests in that property.”270 The literal meaning of a search is best described by the Court in Lopez v. United States: In every-day talk, as of 1789 or now, a man ‘searches’ when he 264. Id. at 956 (Sotomayor, J., concurring) (“I would ask whether people reasonably expect that their movements will be recorded and aggregated in a manner that enables the Government to ascertain, more or less at will, their political and religious beliefs, sexual habits, and so on.”); id. at 963 (Alito, J., concurring) (“Recent years have seen the emergence of many new devices that permit the monitoring of a person’s movements. In some locales, closed-circuit television video monitoring is becoming ubiquitous. On toll roads, automatic toll collection systems create a precise record of the movements of motorists who choose to make use of that convenience.”); see also, e.g., People v. Weaver, 909 N.E.2d 1195, 1199–1200, (N.Y. 2009) (noting that data collected from one’s GPS may disclose information private in nature). 265. Jones, 132 S. Ct. at 963 (Alito, J., concurring). 266. Id. 267. Id. at 954 (Sotomayor, J., concurring). 268. Compare Katz v. United States, 389 U.S. 353 (1967) (“The Government’s activities in electronically listening to and recording the petitioner’s words violated the privacy upon which he justifiably relied while using the telephone booth and thus constituted a ‘search and seizure’ within the meaning of the Fourth Amendment.”) with Jones, 132 S. Ct. at 361 (Harlan, J., concurring) (“[T]he invasion of a constitutionally protected area by federal authorities is, as the Court has long held, presumptively unreasonable in the absence of a search warrant.”). However, not much can be read into his choice of “search warrant” as search warrants commonly authorize seizure of property that is evidence of a crime. See, e.g., WIS. STAT. § 968.13 (2014) (showing that search warrants are generally related to seizure of items that may constitute evidence of a crime). 269. Terry v. Ohio, 392 U.S. 1, 19 n.16 (1968). 270. United States v. Jacobsen, 466 U.S. 109, 113 (1984); see also LAFAVE, supra note 204, § 2.1(a) (5th ed. 2012) (noting that the court does not have difficulty defining what constitutes a seizure). No. 1] HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD 115 looks or listens. Thus we find references in the Bible to ‘searching’ the Scriptures (John V, 39); in literature to a man ‘searching’ his heart or conscience; in the law books to ‘searching’ a public record. None of these acts requires a manual rummaging for concealed objects. . . . Just as looking around a room is searching, listening to the sounds in a room is searching. Seeing and hearing are both reactions of a human being to the physical environment around him—to light waves in one instance, to sound waves in the other. And, accordingly, using a mechanical aid to either seeing or hearing is also a form of searching. The camera and the dictaphone both do the work of the end-organs of an individual human searcher—more accurately.271 In the abstract, communication, whether through the Internet or over the phone, is difficult to fit within the categories of search or seizure.272 Yet, technological realities, when analogized to traditional definitions, sheds light on how to categorize the access to information. As explained above,273 most information is obtained without a physical intrusion.274 The literal meaning of a search, “to carefully look for someone or something[;] to try to find someone or something,”275 is well established. Until recently there was no need to distinguish between collection and access of information because in many instances, the collection of data by the agency (for example wiretapping) and access to that information (listening to the wiretapped conversation) was simultaneous. Further, the scope of data collected and analyzed by government agencies was beyond the technological capabilities of human development. D. Government’s Subjective Intent The Court has generally treated subjective intent of the law enforcement officer as irrelevant to the Fourth Amendment analysis. The Court never held “that an officer’s motive invalidates objectively justifiable behavior under the Fourth Amendment; but [the Court] ha[s] repeatedly held and asserted the contrary.”276 Inventory searches277 and administrative inspections278 are the 271. Lopez v. United States, 373 U.S. 427, 459 (1963) (Brennan, J., dissenting) (quoting United States v. On Lee, 193 F.2d 306, 313 (2d. Cir. 1951) (Frank, J., dissenting)); see also LAFAVE, supra note 204, § 2.1(a) (5th ed. 2012) (defining search under the traditional approach). 272. See CLIFFORD S. FISHMAN & ANNA T. MCKENNA, WIRETAPPING AND EAVESDROPPING § 1:5 (2015) (noting fundamental difficulty in distinguishing between a search for a conversation and a seizure of said conversation). 273. Jones, 132 S. Ct. at 955 (Sotomayor, J., concurring). 274. Id. 275. See MERRIAM-WEBSTER ONLINE DICTIONARY (2015), http://www.merriam-webster.com/dictionary/ search (last visited Mar. 9, 2016) (providing the definition of “search”). 276. Whren v. United States, 517 U.S. 806, 812 (1996). 277. An inventory search is the search of property lawfully seized and detained in order to ensure that it is harmless, to secure valuable items (such as might be kept in a towed car), and to protect against false claims of loss or damage. See South Dakota v. Opperman, 428 U.S. 364, 369 (1976) (discussing further how different jurisdictions handle inventory searches). 278. An administrative inspection is the inspection of business premises conducted by authorities 116 JOURNAL OF LAW, TECHNOLOGY & POLICY [Vol. 2016 exceptions to this general rule. When government officials conduct inventory searches or administrative inspections as a pretext to discovering incriminating evidence without probable cause, they violate the Fourth Amendment.279 Yet, the subjective intent of government officials may sometimes be relevant to the objectiveness analysis. In Florida v. Jardines,280 the Court considered a case where police officers approached the front door of a house— an area also considered curtilage281—without a warrant with a drug-sniffing dog to investigate an unverified tip282 that marijuana was being grown in the house.283 The Court decided the case based on the property-based protection of the Fourth Amendment.284 The Court first recognized that there was an “implied license” for the public to come into the curtilage to knock on the door.285 Yet, “[t]he scope of [this] license—express or implied—is limited not only to a particular area but also to a specific purpose.”286 The Court held that introducing “a trained police dog to explore the area around the home in hopes of discovering incriminating evidence” was not within that implied license to enter the curtilage.287 Consequently, the officers were trespassing into an area protected by the Fourth Amendment when they entered into the curtilage for the purpose of obtaining incriminating evidence.288 Therefore, this act of trespass was a search within the meaning of the Fourth Amendment.289 The violation in Florida v. Jardines did not occur by the simple act of entering the curtilage; the violation occurred because police officers entered the curtilage “to engage in conduct not explicitly or implicitly permitted by the homeowner.”290 The Court stated: “no one is impliedly invited to enter the protected premises of the home in order to do nothing but conduct a search.”291 Although this language seems to inject the subjective purpose of the government official engaging in a particular conduct into the Fourth responsible for enforcing a pervasive regulatory scheme—for example, unannounced inspection of a mine for compliance with health and safety standards. See Donovan v. Dewey, 452 U.S. 594, 599–605 (1981) (discussing how different jurisdictions have handled administrative inspections). 279. See Opperman, 428 U.S. at 379 (discussing pretextual inventory searches). 280. Florida v. Jardines, 133 S. Ct. 1409, 1416 (2013). 281. Curtilage is defined as the area “immediately surrounding and associated with the home,” which is considered as “part of the home itself for Fourth Amendment purposes.” Oliver v. United States, 466 U.S. 170, 176 (1984). Further, this area around the home is “intimately linked to the home, both physically and psychologically,” and is where “privacy expectations are most heightened.” California v. Ciraolo, 476 U.S. 207, 213 (1986). 282. An “unverified tip” is usually not enough for a finding of probable cause. Adams v. Williams, 407 U.S. 143, 147 (1972) (“Some tips, completely lacking in indicia of reliability, would either warrant no police response or require further investigation before a forcible stop of a suspect would be authorized.”). 283. Jardines, 133 S. Ct. at 1413. 284. “[T]hough Katz may add to the baseline, it does not subtract anything from the Amendment’s protections ‘when the Government does engage in [a] physical intrusion of a constitutionally protected area.’” Id. at 1414 (citing United States v. Knotts, 460 U.S. 276, 286 (1983) (Brennan, J., concurring in the judgment)). 285. Id. 286. Id. at 1416. 287. Id. 288. Id. 289. Id. 290. Id. at 1414. 291. Id. at 1416 n.4. No. 1] HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD 117 Amendment analysis, it is likely to be limited to the context of property-based (trespass) Fourth Amendment analyses. Further, the lack of a purpose analysis in determining whether a violation has occurred exists in other contexts as well. In Smith v. Maryland,292 the Court concluded that “because individuals have no actual or legitimate expectation of privacy in information they voluntarily relinquish to telephone companies, the use of pen registers by government agents is immune from Fourth Amendment scrutiny.”293 The Court did not distinguish between the purposes of revealing information to the telephone companies. According to Justice Marshall, though, writing for the dissent, “[p]rivacy is not a discrete commodity, possessed absolutely or not at all. Those who disclose certain facts to a bank or phone company for a limited business purpose need not assume that this information will be released to other persons for other purposes.”294 The irrelevancy of subjective intent is important because data collection and analysis is a tremendously powerful tool in law enforcement. Although local law enforcement agencies do not yet have the technical capabilities to intercept entire sets of data communications, the improvement in technology already allows them to process high amounts of data in a fraction of a second.295 Royal Canadian Mounted Police (“RCMP”) uses automatic license plate recognition technology to monitor vehicles on the road for unregistered vehicles and other criminal associations.296 The statistics published on the RCMP’s website reveal that in two years over three million license plates have been scanned, and over sixty thousand license plates have been flagged for one reason or another.297 E. Expectation of Privacy Following the Supreme Court’s landmark decision in Katz v. United States, a “search” has been understood to mean an activity that intrudes upon a citizen’s “constitutionally protected reasonable expectation of privacy.”298 As articulated in Justice Harlan’s concurrence, a person must exhibit a subjective expectation of privacy, and that expectation must be reasonable in the public’s eye.299 Later courts have somewhat dialed back on the role of subjective 292. 293. 294. 295. Smith v. Maryland, 442 U.S. 735, 749 (1979) (Marshall, J., dissenting). Id. Id. See, e.g., Tres Watkins, Data Mining the Criminal Mind: Big Data and Law Enforcement, SYNCFUSION (Aug. 15, 2014), https://www.syncfusion.com/blogs/post/Data-Mining-the-Criminal-Mind-BigData-and-Law-Enforcement.aspx (discussing various types of technologies available to law enforcement). 296. Automatic License Plate Recognition Technology, ROYAL CANADIAN MOUNTED POLICE, http://traffic.rcmp-grc.gc.ca/ViewPage.action?siteNodeId=23&languageId=1&contentId=11953 (last visited Mar. 6, 2016) (“The [Automatic License Plate Recognition] System is a license plate recognition program that allows vehicles observed by cameras to have their license plate read and recorded using pattern recognition software.”). 297. Id. 298. Katz v. United States, 389 U.S. 347, 360 (Harlan, J., concurring). 299. Id.; LAFAVE, supra note 204, § 2.1 (c) 118 JOURNAL OF LAW, TECHNOLOGY & POLICY [Vol. 2016 expectation of privacy as a requirement for Fourth Amendment protection.300 It is very easy to destroy a person’s subjective expectation of privacy from a position of power. This is most evident in airports where the expectation of privacy is none because of many postings around the airport telling people that they don’t have an expectation of privacy.301 People’s online presence and the tendency to share information regarding their daily lives can also be an indication of a reduced subjective expectation of privacy. Many websites inform users that they collect and analyze usage data or other information regarding the user.302 Even the collection of the data by the government of this data raises eyebrows.303 In this respect, the problem is how to answer the question “expectation of privacy in what?”304 The answer is quite simply “information”—information regarding our activities, thoughts, associations, or “what hour each night the lady of the house takes her daily sauna and bath.”305 In Kyllo v. United States, the Court, in considering the Fourth Amendment implications of thermal imagers, drew a bright line rule that thermal imagers, which had the capabilities to reveal intimate details of the home, could not be used to conduct a search without a warrant.306 The Court rejected the government’s argument that the thermal imager in this instance did not “detect private activities occurring in private areas,” and stated that “[t]he Fourth Amendment’s protection of the home has never been tied to the measurement of the quality or quantity of information obtained.”307 What the Court was concerned with was the potential of the thermal imager to obtain such information.308 In this respect, two proxies regarding expectation of privacy are relevant to our issue: knowing exposure to the public309 and devices in general public use.310 300. LAFAVE, supra note 204, § 2.1 (c). 301. Julie Solomon, Does the TSA Have Stage Fright? Then Why Are They Picturing You Naked?, 73 J. AIR L. & COM. 643, 645–46 (2008). 302. See, e.g., Data Policy, FACEBOOK, https://www.facebook.com/about/privacy (last visited Mar. 9, 2016) (describing Facebook’s utilization of user data); Welcome to the Google Privacy Policy, GOOGLE, https://www.google.com/intl/en/policies/privacy/ (last visited Mar. 9, 2016) (describing Google’s utilization of user data); Yahoo Privacy Center, YAHOO!, https://policies.yahoo.com/us/en/yahoo/privacy/index.htm (last visited Mar. 9, 2016) (describing Yahoo’s utilization of user data). 303. Mike Gentithes, When the Government Mines “Big Data,” Does It Conduct a Fourth Amendment Search?, CBA RECORD, Jan. 2015, at 36, 38 (“While minor government harassment that disturbs a single citizen’s tranquility may be trivial and fail to reach the level of a Fourth Amendment search, it is still a greaterthan-zero intrusion upon our collective tranquility interest that, when accumulated in a program as broad as the NSA’s, may be sufficient to constitute a search and trigger the Fourth Amendment’s protections.”). 304. Orin S. Kerr, The Mosaic Theory of the Fourth Amendment, 111 MICH. L. REV. 311 (2012); see also LAFAVE, supra note 204, § 2.7(e) (“Perhaps the best that can be done in this brief treatment of the subject is to identify more clearly what legitimate privacy concerns attend the investigative processes here under discussion.”). 305. Kyllo v. United States, 533 U.S. 27, 38 (2001). 306. Id. 307. Id. 308. Id. 309. California v. Ciraolo, 476 U.S. 207, 213 (1986). 310. Kyllo, 533 U.S. at 29. No. 1] 1. HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD 119 Knowing Exposure to the Public “What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection.”311 The idea behind knowing exposure to the public is the expectation of privacy.312 There is no expectation of privacy on what a person reveals to the public.313 This may explain treating light differently based on its wavelength. Visible light only passes through windows and the police can see through it. So, if the person does not have drapes, whatever is visible inside has no Fourth Amendment implications. With regard to thermal imaging, however, the infrared light emitted from the heat sources inside the house—such as people, hot showers, and heat lamps—are exposed without intention.314 The trouble with this standard is twofold. First, this destroys any Fourth Amendment protection to digital data. In Smith v. Maryland, the Court held that a person does not have an expectation of privacy in information disclosed voluntarily to a third party, such as the telephone company, including the numbers dialed.315 Similarly, most browsing data and other information transferred on a computer travels through data centers and is in many ways exposed to a third party.316 The second trouble is the mental state of knowing.317 This should be taken more strictly and more akin to intentional because even though we know everything that has heat in it will emanate in the form of infrared light, it is not necessarily true that we intend to expose the heat from the shower to others.318 Concerning online presence, it is simply too difficult to expect any kind of right to privacy. However, the question is not whether we display an expectation of privacy in each individual piece of information we enter on the Internet, but whether an expectation of privacy exists in all of our activities and preferences. The information gained from one’s browsing history is simply far more useful and more potent than a search of the home. In the online context, it is possible to create a very secure connection with an online server using a HTTPS protocol, which uses a two-layer communication protocol that encrypts data during transfer.319 Yet, most websites do not offer HTTPS support, and it is not possible to unilaterally set up such a connection from the user’s end.320 Regardless of the secure connection, it is still a secure connection to a third party, from whom the 311. Katz v. United States, 389 U.S. 347, 351 (1967). 312. Id. at 361 (Harlan, J., concurring). 313. Id. 314. Kyllo, 533 U.S. at 27, 35. 315. Smith v. Maryland, 442 U.S. 735 (1979). 316. Rus Shuler, How Does the Internet Work?, STANFORD (2002), https://web.stanford.edu/class/ msande91si/www-spr04/readings/week1/InternetWhitepaper.htm. 317. Katz v. United States, 389 U.S. 347, 351 (1967). 318. See Kyllo, 533 U.S. at 33 (discussing the importance of a subjective expectation of privacy). 319. What is HTTPS?, INSTANT SSL BY COMODO, https://www.instantssl.com/ssl-certificateproducts/https.html (last visited Mar. 9, 2016). 320. Scott Gilbertson, HTTPS Is More Secure, So Why Isn’t the Web Using It?, ARS TECHNICA (Mar. 20, 2011, 6:00 PM), http://arstechnica.com/business/2011/03/https-is-more-secure-so-why-isnt-the-web-using-it/. 120 JOURNAL OF LAW, TECHNOLOGY & POLICY [Vol. 2016 government can obtain the information without running afoul of the Fourth Amendment.321 Finally, what is it that is “knowingly exposed to the public?”322 Is it a particular piece of fact, or is it the information that several particular pieces of fact can tell about that person? With online data, each piece of information, a data point, may not be meaningful in any sense, but in aggregation as a data set, it does become meaningful and a meaning that the person never intended to reveal or never knew could be revealed.323 2. Devices in General Public Use The Supreme Court developed “devices in general public use” as another proxy to determine the reasonable expectation of privacy in Kyllo v. United States.324 In Kyllo, the police officers “suspect[ed] that marijuana was being grown in the home belonging to petitioner” and used a thermal imager to scan the home.325 Thermal imaging devices detect infrared light in the electromagnetic spectrum.326 The light visible to the human eye has wavelengths between 390 nanometers and 700 nanometers.327 Infrared light has a wavelength greater than 700 nanometers and less than one millimeter (one million nanometers).328 Therefore, infrared light cannot be seen by the naked eye without help.329 The Court held that, when “the technology in question is not in general public use . . . obtaining by sense-enhancing technology any information regarding the interior of the home that could not otherwise have been obtained without physical intrusion into a constitutionally protected area, constitutes a search.”330 The Court used the “general public use” as a proxy for the expectation of privacy.331 As highlighted by the dissent in Kyllo, “the contours of [the Court’s] new rule are uncertain because its protection apparently dissipates as soon as the relevant technology is ‘in general public use.’”332 The earliest patent on the method for creating thermal imagers was filed as early as 1946.333 Yet, the 321. Jennifer Valentino-Devries, How Technology Is Testing the Fourth Amendment, DIGITS (Sept. 21, 2011, 10:32 PM), http://blogs.wsj.com/digits/2011/09/21/how-technology-is-testing-the-fourth-amendment/. 322. Katz, 389 U.S. at 351 (1967). 323. Laura Lenhart, Personal Information, Personal Property, ILL. DIGITAL ENV’T FOR ACCESS TO LEARNING & SCHOLARSHIP, https://www.ideals.illinois.edu/bitstream/handle/2142/42118/454e.pdf (last visited Mar. 6, 2016). 324. Kyllo v. U.S., 533 U.S. 27 (2001). 325. Id. at 34. 326. How Thermal Imaging Works, INFO.COM, http://topics.info.com/How-Thermal-Imaging-Works_ 1502 (last visited Mar. 9, 2016). 327. Christopher Crockett, What Is the Electromagnetic Spectrum?, EARTHSKY (May 19, 2014), http://earthsky.org/space/what-is-the-electromagnetic-spectrum. 328. Jim Lucas, What Is Infrared?, LIVE SCI. (Mar. 26, 2015, 2:52 AM) http://www.livescience.com/ 50260-infrared-radiation.html. 329. Id. 330. Kyllo, 533 U.S. at 3 (quoting Silverman v. U.S., 365 U.S. 505, 512 (1961)) 331. Id. (“This assures preservation of that degree of privacy against government that existed when the Fourth Amendment was adopted.”). 332. Id. at 47 (Stevens, J., dissenting). 333. U.S. Patent No. 2,403,066 (filed Dec. 28, 1943). No. 1] HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD 121 first thermal imagers were introduced in 1960s.334 Until the 1990s, however, the cost of producing thermal imagers outweighed the benefit.335 When the court decided the case in 2001, the cost of thermal imagers were still relatively high.336 Now, fifteen years after the Kyllo decision, a thermal imager for an iPhone can be purchased for $250.337 Thermal imagers are also used frequently by homeowners to detect parts of the house that leak heat and are in need of insulation.338 F. Wiretapping Wiretapping is a highly regulated area. The Federal Wiretap Act makes it a criminal offense to intercept communications traveling on interstate or foreign commerce.339 In Berger v. State of New York, the Court held “‘conversation’ [is] within the Fourth Amendment’s protections, and that the use of electronic devices to capture it [is] a ‘search’ within the meaning of the Amendment . . . .”340 Mass data collection by the National Security Agency (“NSA”) reported by the news341 and acknowledged by the Obama administration342 has drawn much interest by the public343 as well as academics.344 G. Mosaic Theory Recent literature has focused on the idea of a “mosaic theory” of the Fourth Amendment.345 The D.C. Circuit in United States v. Maynard introduced the mosaic theory.346 “Under the mosaic theory, searches can be analyzed as a 334. History of Thermal Imaging, BULLARD, www.bullard.com/V3/products/thermal_imaging/ history_of_thermal_imaging.php (last visited Mar. 9, 2016). 335. FLIR, THE THERMAL REVOLUTION (June 2007), http://www.flir.com/uploadedFiles/CVS_Americas/ Security/Applications/App_Notes_Revolution_a.pdf. 336. Id. 337. Buy FLIR ONE, FLIR, http://www.flir.com/flirone/display/?id=69324 (last visited Mar. 9, 2016). 338. Thermal Imaging Cameras Explained, GRAINGER, https://www.grainger.com/content/qt-thermalimaging-applications-uses-features-345 (last updated Sept. 2015). 339. 18 U.S.C. § 2511 (2012). 340. 388 U.S. 41, 51 (1967). 341. Glenn Greenwald, NSA Collecting Phone Records of Millions of Verizon Customers Daily, GUARDIAN (June 6, 2013, 6:05 AM), http://www.theguardian.com/world/2013/jun/06/nsa-phone-recordsverizon-court-order. 342. Roberts & Ackerman, supra note 17. 343. Susan Page, Poll: Most Americans Now Oppose the NSA Program, USA TODAY (Jan. 20, 2014, 3:10 PM), http://www.usatoday.com/story/news/politics/2014/01/20/poll-nsa-surveillance/4638551/. 344. See, e.g., Blake Covington Norvell, The Constitution and the NSA Warrantless Wiretapping Program: A Fourth Amendment Violation?, 11 YALE J. L. & TECH. 228 (2009) (discussing the constitutionality of the NSA’s wiretapping program). 345. David C. Gray & Danielle Keats Citron, A Shattered Looking Glass: The Pitfalls and Potential of the Mosaic Theory of Fourth Amendment Privacy, 14 N.C.J.L. & TECH. 381 (2013); Orin S. Kerr, The Mosaic Theory of the Fourth Amendment, 111 MICH. L. REV. 311 (2012); Priscilla J. Smith, Much Ado About Mosaics: How Original Principles Apply to Evolving Technology in United States v. Jones, 14 N.C.J.L. & TECH. 557 (2013). 346. 615 F.3d 544, 562 (D.C. Cir. 2015). 122 JOURNAL OF LAW, TECHNOLOGY & POLICY [Vol. 2016 collective sequence of steps rather than as individual steps.”347 Identifying Fourth Amendment searches requires analyzing police actions over time as a collective “mosaic” of surveillance; the mosaic can count as a collective Fourth Amendment search even though the individual steps taken in isolation do not.”348 The Supreme Court took the appeal from United States v. Maynard and analyzed the case under the Fourth Amendment.349 The Court was divided in United States v. Jones.350 Justice Scalia, writing for the Court, decided the case under the trespass doctrine.351 Justice Alito, joined by three other justices, would have decided the case under the reasonable expectation of privacy analysis.352 According to Justice Alito, “[s]hort-term monitoring of a person’s movements on public streets accords with expectations of privacy” but “the use of longer term GPS monitoring in investigations of most offenses impinges on expectations of privacy.”353 As the Maynard court explained: Prolonged surveillance reveals types of information not revealed by short-term surveillance, such as what a person does repeatedly, what he does not do, and what he does ensemble. These types of information can each reveal more about a person than does any individual trip viewed in isolation. Repeated visits to a church, a gym, a bar, or a bookie tell a story not told by any single visit, as does one’s not visiting any of these places over the course of a month. The sequence of a person’s movements can reveal still more; a single trip to a gynecologist’s office tells little about a woman, but that trip followed a few weeks later by a visit to a baby supply store tells a different story. A person who knows all of another’s travels can deduce whether he is a weekly church goer, a heavy drinker, a regular at the gym, an unfaithful husband, an outpatient receiving medical treatment, an associate of particular individuals or political groups—and not just one such fact about a person, but all such facts.354 Justice Sotomayor, alone in her concurring opinion, joined Justice Scalia’s opinion with regard to the application of the trespass doctrine.355 Yet, she went further than Justice Alito’s opinion with regard to the reasonable expectation of privacy analysis and explained that even short-term GPS monitoring would violate the Fourth Amendment under a reasonable expectation of privacy analysis.356 In order to give more context to the mosaic theory, it might be beneficial 347. 348. 349. 350. 351. 352. 353. 354. 355. 356. Id. Kerr, supra note 345, at 313. United States v. Jones, 132 S. Ct. 945 (2012). Id. at 952. Id. at 948. Id. at 957–64. Id. at 964. United States v. Maynard, 615 F.3d 544, 562 (D.C. Cir. 2010). Jones, 132 S. Ct. at 954–57. Id. at 955. No. 1] HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD 123 to look at the factual scenario that occurred in United States v. Jones. In Jones, law enforcement officers installed a GPS device under the defendant’s car to monitor his movements in public roads over four weeks.357 At any individual point in time, because the defendant “knowingly exposes [his location] to the public,”358 no search occurs. However, when an individual’s movements on public roads are monitored for four weeks, the mosaic theory would hold that a search occurs because of the collective actions by the law enforcement officers.359 Further, there remains a question of whether individual pieces of information that do not reveal any information can become protected by the Fourth Amendment by nature of its aggregation.360 The mosaic theory, however, mischaracterizes when a search occurs. It is very different to say that a search does not occur when a person is viewed in a public street and when a person is followed through a GPS device for a period of time. The information gained through one is very different than the information gained through the other.361 The mosaic theory “groups conduct that is not a search and asks if the non-searches considered together cross the line to become a search.”362 This approach presupposes that a reasonable expectation of privacy can only be in the place to be searched or the item to be seized. There are three versions of mosaic theory that outline a reasonable expectation of privacy: “societal expectations about law enforcement practices,” “government power,” and “whether the government learned more than a stranger could have observed.”363 All of these standards suffer from ambiguity on how to determine the society’s knowledge or expectations of what others might do.364 However, the focus of both Justices of the Supreme Court and commentators is on what information is learned.365 What is learned from a brief encounter on the street and constant surveillance is easily distinguishable.366 The Fourth Amendment’s protection does not depend on “measurement of the quality or quantity of information obtained”367 by the government’s surveillance technique, but what that technique has the potential 357. Id. at 963. 358. Maynard, 615 F.3d at 559. 359. Jones, 132 S. Ct. at 964. 360. Joseph S. Fulda, Data Mining and Privacy, 11 ALB. L.J. SCI. & TECH. 105, 109 (2000) (“Is it possible for data that does not in itself deserve legal protection to contain implicit knowledge that does deserve legal protection?”). 361. Maynard, 615 F.3d at 556. 362. Kerr, supra note 345, at 329. 363. Id. at 350. 364. See id. (discussing in further detail how standards suffer). 365. See Matthew B. Kugler & Lior Strahilovitz, Surveillance Durations Doesn’t Affect Privacy Expectations: An Empirical Test of the Mosaic Theory 5 (Univ. of Chi. Law Sch., Working Paper No. 727, 2015) (discussing the Supreme Court’s focus on the types of information captured via extended surveillance and academic analysis thereof). 366. See id. at 36 (stating the stark differences between information obtained via lengthy surveillance and that obtained via brief tracking). 367. Kyllo v. United States, 533 U.S. 27, 37 (2001). 124 JOURNAL OF LAW, TECHNOLOGY & POLICY [Vol. 2016 to reveal.368 H. Section 215 of the USA PATRIOT Act Section 215 of the USA PATRIOT Act was interpreted by the NSA to allow access to personally identifiable information upon “a statement of facts showing that there are reasonable grounds to believe that the tangible objects sought are relevant . . . against international terrorism . . . .”369 The NSA has created a program to collect and store telephone metadata through private phone companies such as Verizon Wireless.370 The NSA’s program was authorized by Section 215 of the USA PATRIOT Act.371 It also allowed the government to compel the production of “any tangible things (including books, records, papers, documents, and other items).”372 It is regarded as one of the most expensive pieces of legislation authorizing government activity, and even the drafter of the act does not support that reading of the statute.373 IV. ANALYSIS From the review of the case law and commentators it is evident that the activities of the government run afoul of the Fourth Amendment when those activities have potential to reveal information in excess of what the government could traditionally learn without warrants.374 The highest protection of the Fourth Amendment is at home375 because of the information contained inside the four corners of the home and blocked by the walls.376 These intimate details are what separate the home from other places, and these intimate details are what the Fourth Amendment ought to protect. A. Reasonable Expectation of Privacy in Life One of the biggest difficulties in scrutinizing the collection and analysis 368. See id. at 38 (discussing what information is revealed by the use of a thermal imaging device and the circumscriptions on the information as contemplated by the Fourth Amendment). 369. USA PATRIOT Improvement and Reauthorization Act of 2005, 50 U.S.C. § 1861(b)(2)(B) (2012). 370. For a detailed discussion of phone metadata collection and related Supreme Court jurisprudence, see Nathaniel Wackman, Historical Cellular Location Information and the Fourth Amendment, 2015 U. Ill. L. Rev. 263 (2015), which provides a detailed discussion of phone metadata collection and related Supreme Court jurisprudence. For a discussion of the challenge against NSA program, see Susan Freiwald, Nothing to Fear or Nowhere to Hide: Competing Visions of the NSA’s 215 Program, 12 COLO. TECH. L.J. 309, 323 (2014), which discusses the challenges against the NSA’s surveillance programs. 371. 50 U.S.C. § 1861(c)(2)(F)(iv). 372. 50 U.S.C. § 1861(a)(1). 373. Sensenbrenner: PATRIOT Act Needs Changes After NSA Revelations, WISPOLITICS.COM, (June 24, 2013 9:26 AM), http://dc.wispolitics.com/2013/06/sensenbrenner-patriot-act-needs-changes.html (“[NSA activities leaked by Edward Snowden] certainly was not what was contemplated when the PATRIOT Act was passed.”). 374. See generally id. (revealing Rep. Sensenbrenner’s belief that Snowden’s releasing classified information showed the public that the law was being used in ways that were unintended in the original debate). 375. Kyllo v. United States, 533 U.S. 27, 40 (2001) (citing Payton v. New York, 445 U.S. 573, 590 (1980)). 376. Id. No. 1] HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD 125 of data by the government is the knowing exposure of this information to third parties.377 Most of the data exchanged over the Internet is necessarily shared with ISPs and at least the information that you are trying to receive is shared.378 This particular limitation defeats the Fourth Amendment protection just because of how the Internet is set up. The acts and communications displayed in the virtual environment through our use of technology to track our lives would suggest that people do not have that expectation of privacy. In a more traditional approach to the Fourth Amendment, our individual acts of revealing certain information to third parties, as articulated above, suggests that there is no expectation of privacy. Even then, however, no one in 1776 would have expected that when he or she shares certain information with certain people, those people would get together and share their knowledge. It would be unreasonable to expect people to do so. A person in 1776 would have a privacy interest in the aggregated information, because aggregated information is our lives. At least one circuit court has already articulated this position in Reeves v. Churchich.379 The court held that pointing a rifle at a premises occupant, even if the end of the rifle was inserted inside those premises and “constituted a common law trespass,” nonetheless was “not a Fourth Amendment violation” because “the rifle was incapable of obtaining information.”380 The outcome of Reeves might be different in light of Jones v. United States, however, where the Court reviewed the technical trespass further381 and reflected the premise that the privacy is in the information and not simply how it is obtained.382 Further, the courts have already considered technological devices that gather certain information and characterized the use of such devices as a search.383 In United States v. Epperson, in concluding that the use of a magnetometer was a search, the court stated, “a government officer, without permission, discerned metal on Epperson’s person.”384 These increased technologies do not simply “enhance police senses as they do replace them with something superhuman, an ability to perceive that people simply do not have.”385 These devices give new information to the officer—information they 377. Katz v. United States, 389 U.S. 347, 351 (1967). 378. See Rory Cellan-Jones, Web Surveillance—Who’s Got Your Data?, BBC NEWS (Apr. 2, 2012), http://www.bbc.com/news/technology-17586605 (articulating the position that while ISPs may not collect personally identifiable information, they are collecting metadata on their users). 379. Reeves v. Churchich, 484 F.3d 1244 (10th Cir. 2007). 380. Id. at 1256. 381. See United States v. Jones, 132 S. Ct. 945, 951 n.5 (2012) (discussing the general principle that a trespass must be conjoined with an attempt to gain information to constitute a search). 382. See Reeves, 484 F.3d 1244 (illustrating that the right to privacy and protection against unlawful searches attaches to specific information sought to be kept private and not simply the means by which law enforcement might search). 383. See LAFAVE, supra note 204 (elaborating on the impact of the expansion of technology and court opinions that have limited such technology being used to conduct surveillance on American citizens). 384. United States v. Epperson, 454 F.2d 769, 770 (4th Cir. 1972). 385. David A. Harris, Superman’s X-Ray Vision and the Fourth Amendment: The New Gun Detection Technology, 69 TEMP. L. REV. 1, 24 (1996) (emphasis added); see also Christopher Slobogin, TechnologicallyAssisted Physical Surveillance: The American Bar Association’s Tentative Draft Standards, 10 HARV. J.L. & TECH. 383, 447–52 (1997) (reaching same conclusion and discussing proposed limitations on use of such devices). 126 JOURNAL OF LAW, TECHNOLOGY & POLICY [Vol. 2016 could not otherwise obtain or gather.386 In describing “the right to be let alone” Justice Brandeis, in his dissenting opinion in Olmstead v. United States, stated the Framers “sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations.387 They conferred, as against the government, the right to be let alone—the most comprehensive of rights and the right most valued by civilized men.”388 Although the Fourth Amendment does not give “a general constitutional ‘right to privacy,’”389 it does protect “what he [or she] seeks to preserve as private, even in an area accessible to the public.”390 What he or she seeks to preserve as private is information about himself or herself—thoughts, beliefs, and browsing history.391 After all, “the Fourth Amendment protects people, not places.”392 Imagine that a police officer is standing in a pitch-dark room, and there is nothing in his reaching distance.393 Standing there in the room, the officer cannot learn anything. He can try to look for things but his capability to do so is limited by his eyes. Because there is no information gained, no search occurs. B. Information Gathering is Not Seizure Information gathering is not seizure because there is no “meaningful interference with an individual’s possessory interests in” information.394 First, as discussed above, “[d]ata in its ethereal, non-physical form is simply information . . . .”395 It is difficult to conceptualize how one can seize information. It is possible to seize items containing information, such as papers or hard drives, but information itself is not seized. Second of all, although there is a privacy interest in information, it does not translate to a possessory interest.396 Finally, there is no meaningful interference with the flow of information. Just as in Katz, the information continues to flow and it is copied rather than intercepted.397 Yet, data gathering, even without the analysis, can have a substantial 386. See Slobogin, supra note 385, at 385 (discussing some of the general applications of surveillance technology in law enforcement). 387. Olmstead v. United States, 277 U.S. 438, 478 (1928) (Brandeis, J., dissenting). 388. Id. 389. Katz v. United States, 389 U.S. 347, 350 (1967). 390. Id. at 351. 391. See generally Nathan Freed Wessler, How Private Is Your Online Search History?, AM. C.L. UNION (Nov. 12, 2013, 12:04 PM), http://www.aclu.org/blog/how-private-your-online-search-history (exploring the privacy of web browser and Internet search history). 392. Katz, 389 U.S. at 351. 393. For the purposes of this example assume there is no trespass. 394. United States v. Jacobsen, 466 U.S. 109, 113 (1984). 395. Digitech Image Techs., LLC v. Elecs. for Imaging, Inc., 758 F.3d 1344, 1350 (Fed. Cir. 2014). 396. See Steven G. Davison, Warrantless Investigative Seizures of Real and Tangible Personal Property by Law Enforcement Officers, 25 AM. CRIM. L. REV. 577, 599 (1988) (highlighting the distinction between “possessory interests” and “privacy interests” in the context of searches and seizures under the Fourth Amendment). 397. As discussed above in Part II, some of the techniques do allow for interception of the data and such techniques may implicate the Fourth Amendment. This point is outside the scope of this project. No. 1] HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD 127 chilling effect on peoples’ activities. Knowing that every act is recorded by the government, individuals might be reluctant to visit certain websites or engage in certain activities in fear of being recorded and later flagged by the government. Although over-deterrence is a risk, procedural safeguards as articulated below should reduce this chilling effect, as the access to information will be regulated by the Fourth Amendment. C. Acquisition v. Access There are two distinct points where a potential violation of this privacy interest in information can occur: during initial acquisition of information and during access of information.398 Information acquisition usually occurs in increments as pieces of information gathered from various sources.399 Information access is a more continuous endeavor. Gathered information data points are collectively displayed or analyzed for patterns and meaningful data sets.400 Information access fits the definition of search better than information acquisition.401 Only during access to information does the individual or the automated program “try to find someone or something.”402 At this stage, the officer or the computer program searches individual data points and fits them into categories that reveal other information of interest.403 During the gathering stage, information is copied in bits and pieces.404 As proponents of mosaic theory suggest, there is a problem with gathering individual pieces, which would amount to an unreasonable search.405 Yet, the sequence of events that goes from individual data acquisition to the aggregated data simply does not fit into any literal meaning of search.406 As discussed above, most acquisition methods do not distinguish between the information 398. See generally Mark Taticchi, Redefining Possessory Interests: Perfect Copies of Information as Fourth Amendment Seizures, 78 GEO. WASH. L. REV. 476, 477–78 (2010) (discussing the expected rights individuals have in their information and how access and duplication of information is problematic vis-à-vis Fourth Amendment jurisprudence). 399. See generally Rakesh Sharma, Google’s Acquisition of Nest and Your Privacy, FORBES (Jan. 13, 2014, 9:07 PM), http://www.forbes.com/sites/rakeshsharma/2014/01/13/googles-acquisition-of-nest-and-yourprivacy/#1df42ce3fdf5 (providing an example of incremental acquisition of personal data). 400. Id. (“Google can easily combine this data set with other services to gain an even more complete picture of your movements.”). 401. See MERRIAM-WEBSTER ONLINE DICTIONARY (2015), http://www.merriam-webster.com/ dictionary/search (last visited Mar. 9, 2016) (providing the definition of “search”). 402. Id. 403. See generally Doug Wyllie, How ‘Big Data’ Is Helping Law Enforcement, POLICEONE.COM (Aug. 20, 2013), http://www.policeone.com/police-products/software/Data-Information-Sharing-Software/articles/ 6396543-How-Big-Data-is-helping-law-enforcement/ (discussing how data analytics can improve law enforcement and the role of the crime analyst in utilizing data sets). 404. See Christina DesMarais, Who’s Gathering Your Personal Information?, TECHLICIOUS (Mar. 14, 2014), http://www.techlicious.com/blog/whos-gathering-your-personal-information/ (illustrating the fragmented way personal information and online data is aggregated by data collectors). 405. See Kugler and Strahilovitz, supra note 365, at 5 (illustrating Mosaic Theory proponents’ concerns over the piecemeal collection of a private individual’s information). 406. See generally Kerr, supra note 304, at 315–20 (articulating a historical approach to applying Fourth Amendment law to searches and seizures and its poor fit to questions and problems arising in Mosaic Theory). 128 JOURNAL OF LAW, TECHNOLOGY & POLICY [Vol. 2016 until it is processed.407 Even though it is possible to create a program to only store information that is relevant,408 everything is gathered and analyzed, and the irrelevant data is deleted.409 At the most fundamental level, in order to be able to copy data stored on a computer hard drive, the computer needs to read each bit to copy.410 However, the individual bit does not reveal anything, as it is either a one or zero.411 Only when those zeros and ones are put together can the machine make sense of it.412 However, during the copying stage the act of looking at each individual bit does not reveal any information; therefore no search occurs.413 The reason why there is no search at any individual time on the public streets—that there is no reasonable expectation of privacy in that information—is the same for the online context. There is no individual expectation of privacy in each individual piece of information. However, the reason why the aggregated data feels like a violation is not because the information is out there, it is because the information is accessed all at the same time.414 Information sitting in computer hard drives throughout the country in the servers of various companies does not violate any privacy interests.415 Similarly, when the government gathers data, if it is just sitting in the computer hard drives of massive data centers, no violation occurs because no information is gained. When the information is accessed in a meaningful format, only then a violation occurs because it reveals information protected by the privacy interest.416 D. How Much Is Too Much The difficulty in characterizing the reasonable expectation of privacy in information, or any other theory that depends on a mosaic theory—that 407. FELDMAN & SANGER, supra note 201, at 64 (“Probably the most common theme in analyzing complex data is the classification, or categorization, of elements. Described abstractly, the task is to classify a given data instance into a prespecified set of categories.”). 408. Relevant information could be a keyword, particular name, a phone number, or an address. 409. See Charles Arthur, What Is Google Deleting Under the ‘Right to be Forgotten’—and Why?, GUARDIAN (July 4, 2014, 12:46 PM), http://www.theguardian.com/technology/2014/jul/04/what-is-googledeleting-under-the-right-to-be-forgotten-and-why (providing an example of a large data-collecting company sorting its collected information and discarding what is irrelevant). 410. How Coding Works, CODECONQUEST, http://www.codeconquest.com/what-is-coding/how-doescoding-work/ (last visited Mar. 9, 2016) (“A computer can only understand two distinct types of data: on and off. In fact, a computer is really just a collection of on/off switches (transistors). Anything that a computer can do is nothing more than a unique combination of some transistors turned on and some transistors turned off.”). 411. Each digit in binary code represents one transistor. Id. Binary code is based on ones and zeros arranged in combinations of eight. Id. A single one or zero is only meaningful when it is read relative to the other seven digits that comprise a byte. Id. (“Modern computers contain millions or even billions of transistors, which means an unimaginably large number of combinations.”). 412. Id. 413. Chris Woodford, Hard Drives, EXPLAINTHATSTUFF, http://www.explainthatstuff.com/ harddrive.html (last updated Aug. 24, 2015). 414. Id. 415. Id. 416. The question remains, however, whether a violation occurs when an automated computer program searches the computer or only when a government official reviews the computer’s findings. No. 1] HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD 129 individual information obtained without violating the Fourth Amendment can nevertheless violate the Fourth Amendment in the aggregate—is made clear by the next logical question: How much data is too much? A local police department collecting traffic camera images from a single town’s traffic lights and gathering travel information about the drivers is much different than the mass surveillance and collection of phone records by NSA. The issue is when does data become “aggregated?” “[A]gencies and departments maintain almost 2000 databases, including records pertaining to immigration, bankruptcy, Social Security, military personnel, as well as countless other matters . . . . States maintain public records of arrest, births, criminal proceedings, marriages, divorces, property ownership, voter registration, workers compensation, and scores of other types of records,” including licensing records “on numerous professionals such as doctors, lawyers, engineers, insurance agents, nurses, police, accountants, and teachers.”417 This information as it is held at individual agencies does not pose a problem, as the “practical obscurity”418 still keeps the information that is revealed by the collective analysis of that individual information private.419 The single biggest concern that relates to the privacy concern of the aggregated data is the practical obscurity. Information revealed to third parties,420 the tracking of movement in public streets,421 and information shared on public websites, can all individually be obtained by various methods such as FOIA or by subpoena from various entities that store such information.422 Only when the practical obscurity is removed does the data become aggregated.423 Therefore, the data becomes aggregated when a system is set up for accessing that information from a single access point.424 This formulation of aggregation therefore allows for flexibility on government agencies’ procedures for digitizing records and storing information relevant to the agencies’ function, while protecting against the aggregated access to that information. This formulation does not depend on the agencies’ purpose either. Even if an agency has a completely legitimate purpose, such as the IRS setting up a system to control the accuracy of individuals’ tax filings, when the system acts to collect information from various sources, or allows access to that information from a single access point, the data becomes aggregated for the purposes of the Fourth Amendment. E. Level of Suspicion The level of suspicion to access the aggregated information should be a 417. Daniel J. Solove, Privacy and Power: Computer Databases and Metaphors for Information Privacy, 53 STAN. L. REV. 1393, 1403 (2001). 418. Dep’t of Justice v. Reporters Comm. for Freedom of the Press, 489 U.S. 749, 762 (1989). 419. Id. 420. Smith v. Maryland, 422 U.S. 735, 744 (1979); Klayman v. Obama, 957 F. Supp. 2d 1, 40 (2012). 421. United States v. Jones, 132 S. Ct. 945, 946 (2012). 422. Id. 423. Id. 424. Under this theory there would be a question whether a computer program that analyzes only data available on the Internet would fall under such definition of single access point. 130 JOURNAL OF LAW, TECHNOLOGY & POLICY [Vol. 2016 preponderance of the evidence, a standard higher than probable cause. The intrusion into an individual’s privacy interest in the aggregated data is much higher than a traditional search because the access to aggregated data reveals much more information than a traditional search of a house.425 “The touchstone of the Fourth Amendment is reasonableness . . . .”426 As the Court articulated in Terry v. Ohio,427 when the intrusion into one’s protected interest is low, a lower standard of suspicion is sufficient to justify a search and seizure.428 In the case of access to aggregated data, the weights are reversed. The intrusion into the privacy interest of the individual is much more significant than the brief investigatory stop. It implicates information regarding the entire life of the individual.429 Although the national security interest is also much higher than shoplifting, the Fourth Amendment binds every law enforcement officer, from the county constable to the NSA.430 For that end, even a probable cause standard may fall short of providing a justification for the intrusion. The level of privacy interest in electronic data is somewhat recognized in Riley v. California where the Court held that a warrantless search of a cell phone incident to arrest was unreasonable.431 Although the Court did consider that a warrant issued by a magistrate judge would be sufficient, the aggregated information is even more intrusive than the contents of the cell phone.432 The aggregated information by its “nature precludes [it] from being the object of a reasonable search.”433 Therefore, when the search is unreasonable, even the warrant issued upon probable cause would be unreasonable.434 Due to the nature of information gathered from a search of aggregated data, and its tendency to reveal much more information than a search of a house or work place, access to that information deserves a finding of a higher suspicion level than probable cause. In that regards, the preponderance of evidence standard would allow a greater protection to the information while balancing the needs of law enforcement in the investigation of targeted individuals. Even though probable cause to arrest an individual or search his house will be satisfied before the access to aggregated information is allowed, the information gathered from the aggregated data will be much more than a search of the house or interrogation of the individual.435 425. How Smart Meters Invade Individual Privacy, SMART GRID AWARENESS, http://smartgridawareness.org/privacy-and-data-security/how-smart-meters-invade-individual-privacy/ (last visited Mar. 9, 2016). 426. United States v. Knights, 534 U.S. 112, 118 (2001) (citing Wyoming v. Houghton, 526 U.S. 295, 300 (1999)). 427. 392 U.S. 1, 9 (1968) (citing Elkins v. United States, 364 U.S. 206, 222 (1960)). 428. Id. at 26. 429. See United States v. Jones, 132 S. Ct. 945, 954 (Sotomayor, J., concurring). 430. U.S. CONST. amend. IV. 431. 134 S. Ct. 999 (2014). 432. Id. 433. Warden v. Hayden, 387 U.S. 294, 303 (1967). 434. Id. 435. Id. No. 1] HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD F. 131 Efficient Law Enforcement, Potential for Abuse Use of technological developments increases the efficiency of law enforcement.436 Until recent years, the amount of information law enforcement officers could gather was limited by the capabilities of the individual officers. It was about asking questions, physically following a person in the streets, and stakeouts. Most surveillance methods were procedurally inefficient.437 The ease of obtaining information, however, should not be a case against such techniques. On the contrary, it should be a case for the use of such techniques. Technological data analysis methods allow for more automation. Automation can be taught438 or programmed without relation to individuals’ constitutionally protected characteristics such as race, national origin, and gender. Even though a program can be tweaked to take into account such characteristics, it would be easier to show these violations than the current struggle regarding law enforcement agencies’ motives in enforcing the law. Moreover, when there is a neutral reason for the disparate impact based on a characteristic, it can be shown with reference to the program. As seen in the example of Canadian license plate readers, most violations identified by the system will go untreated because of administrative limitations.439 Yet, automation would allow more efficient distribution of law enforcement resources. For example, the automated software could be programmed to rank or classify findings based on offense types, the distance from an on-duty police officer, or the evidentiary value that gives rise to a suspicion. This allows for objective determinations in crime investigations while leaving enough discretion to compensate for the shortcomings of the software. “Great power comes with great responsibility,”440 yet we still see on the television the abuse of power by the government. These abuses range from the reports of NSA employees exchanging intimate photos,441 to everyday police officer brutalities,442 to systematic police department cultures.443 The primary 436. K.A. Taipale, Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data, 5 COLUM. SCI. & TECH. L. REV. 2 (2003) (“The efficiencies inherent in data aggregation itself cannot be denied; indeed, it is these efficiencies that provide the impetus for developing and employing data aggregation technologies in the first place.”); see also Daniel J. Solove, A Taxonomy of Privacy, 154 U. PA. L. REV. 477, 506–11 (2006) (explaining more on the problems of data aggregation). 437. During oral arguments in Jones v. United States, Chief Justice Roberts asked the government’s lawyer Mr. Dreeben whether the Constitution would allow the FBI to install a GPS device on their cars. 438. Machine learning algorithms are common in data mining. 439. Douglas Quan, ‘You Are Being Tracked’: How Cities Use License-Plate Scanners to Create Vast Databases of Vehicle Sightings, NAT’L POST (July 14, 2014), http://news.nationalpost.com/news/canada/youare-being-tracked-how-cities-use-licence-plate-scanners-to-create-vast-databases-of-vehicle-sightings (last updated Jan. 24, 2016, 10:21 PM). 440. SPIDER-MAN (Marvel Entertainment 2002). 441. Steve Dent, Snowden Shows John Oliver How the NSA Can See Your Dick Pics, ENGADGET (Apr. 6, 2015), http://www.engadget.com/2015/04/06/john-oliver-snowden-interview/. 442. ANDREA J. RITCHIE, ESQ. ET AL., U.N. COMM. ON THE ELIMINATION OF RACIAL DISCRIMINATION, IN THE SHADOWS OF THE WAR ON TERROR: PERSISTENT POLICE BRUTALITY AND ABUSE OF PEOPLE OF COLOR IN THE UNITED STATES (Dec. 2007). 443. U.S. DEP’T OF JUSTICE, CIVIL RIGHTS DIV., INVESTIGATION OF THE FERGUSON POLICE 132 JOURNAL OF LAW, TECHNOLOGY & POLICY [Vol. 2016 concern for the Fourth Amendment—the dislike of general warrants—can be implicated as the ease of accessing information stored in a data center increases and as the loss of “practical obscurity”444 “magnifies and enhances government power”445 and creates the temptation to abuse such power.446 Although these cultural systematic cultural problems are horrifying, it does not involve the Fourth Amendment analysis. The Fourth Amendment “protects individual privacy against certain kinds of governmental intrusion”447 but not others.448 Further, “[i]t is the exploitation of technological advances that implicates the Fourth Amendment, not their mere existence.”449 Therefore the “access” to the information rather than the gathering of the information is what implicates the Fourth Amendment. V. RECOMMENDATION AND CONCLUSION The speed at which information is gathered and analyzed is beyond what the people of 1776 could have imagined. This information, in the aggregate, allows for effective law enforcement and other government activities. However, the removal of practical obscurity regarding the access to information creates significant privacy concerns. The Fourth Amendment’s protection against unreasonable searches and seizures is one of the constitutional safeguards against a particular governmental intrusion.450 There is information stored in databases of various governmental agencies and private corporations that can be obtained by the government without any Fourth Amendment implications.451 However, when a system is created to remove the practical obscurity of obtaining the aggregated information and allow access from a single access point when the data is aggregated, then the access to that aggregated information in such a manner implicates the Fourth Amendment far beyond the use of any other device.452 Regardless of the agencies’ purpose in creating such a system, when the system is capable of obtaining such information, the Fourth Amendment will be violated. Further, the probable cause standard of the Fourth Amendment is dwarfed by the tremendous privacy intrusion, and even a warrant issued upon a finding of probable cause does not satisfy the reasonableness requirement of the Fourth DEPARTMENT, http://www.justice.gov/sites/default/files/opa/press-releases/attachments/2015/03/04/ferguson_ police_department_report.pdf; see also Ta-Nehisi Coates, The Gangsters of Ferguson, ATLANTIC (Mar. 5, 2015), www.theatlantic.com/politics/archive/2015/03/The-Gangsters-Of-Ferguson/386893/ (examining results of the Department of Justice’s report on the shooting of Michael Brown and investigation into the Ferguson Police Department’s practices). 444. Dep’t of Justice v. Reporters Comm. for Freedom of the Press, 489 U.S. 749, 762 (1989). 445. Taipale, supra note 436. 446. Id. 447. Katz v. United States, 389 U.S. 347, 350 (1967). 448. See id. at 363 n.** (stating as an example that “[t]he Fourth Amendment does not protect against unreliable (or law-abiding) associates.” (citation omitted)). 449. United States v. Karo, 468 U.S. 705, 712 (1984). 450. Katz, 389 U.S. at 350. 451. Id. Under this theory there would be a question whether a computer program that analyzes only data available on the Internet would fall under such definition of single access point. 452. Id. No. 1] HOW MUCH DATA CAN THE FOURTH AMENDMENT HOLD 133 Amendment.453 Hence, only upon a preponderance of evidence can a law enforcement agency have access to aggregated data. As with any other area where privacy is concerned, Congress could easily regulate the access to aggregated information and create procedural safeguards that allow a degree of privacy while leveraging the technological power to detect and prevent crime. As Justice Alito suggested, the use of many data gathering and analyzing technology is not that different from traditional wiretapping, yet they are much more powerful.454 The Fourth Amendment’s protections have been highly debated and have seen a lot of changes in recent years. However, the impact of technology on Fourth Amendment jurisprudence has yet to reach its peak. 453. 454. U.S. CONST. amend. IV. United States. v. Jones, 132 S. Ct. 945, 956 (2012) (Alito, J., concurring).
© Copyright 2025 Paperzz